10
Pulling It All Together: Using the SDL to Prevent Real-World Threats
Cyber threats result from software flaws, which are weakness that can be exploited by cyber attack or exploitation of a software application or system. In this book, we have covered strategies for implementing specific aspects of software security in the form of SDL best practices to assist software development organizations in avoiding and reducing software flaws as an essential element of effective core software security by providing security at the source.
Although achieving a vulnerability-free product is exceedingly difficult, maybe even impossible, it should always be your goal. By applying the best practices in this book, the software you develop will be as free from ...
Get Core Software Security now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.