Lists of Figures, Tables and Listings
List of Illustrations
- Figure 1.1: Having only a login page doesn’t help much.
- Figure 1.2: Traditionally, software security is viewed as explicit activities and concepts.
- Figure 1.3: A focus on design rather than on security avoids issues with the traditional approach to security.
- Figure 1.4: Exploring concepts with domain experts to gain deeper insight into the domain
- Figure 2.1: The normal flow when Joe buys two copies of Hamlet at $39 each
- Figure 2.2: The “to pay” value of a negative book in a shopping cart
- Figure 2.3: Online store sending -$39 to billing and to the accounts receivable ledger
- Figure 2.4: Accounts receivable ledger sending a credit invoice and clearing the ledger
- Figure 2.5: Joe Tester ...
Get Secure by Design now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.