December 2014
Intermediate to advanced
320 pages
8h 37m
English
access control
centralized, 135
design and, 102
failures, 233
PDP (Policy Decision Point), 136
account management, 91
active development, 44
administrative users as stakeholders, 55-56
advisor (security team), 52
Anderson, James P., Computer Security Threat Modeling and Surveillance, 26
Apache web server, 28
Apple in-app purchasing system attack, 252
application-level event logging, 163
application servers, infrastructure integration and, 204
AppScan (IBM), 48
architectural diagrams, testing and, 170
architecture, 100
ASIM, 27
assessment, confluence, 279-289
assets
critical, identifying, 237
attacks ...