home *** CD-ROM | disk | FTP | other *** search
/ New Perspectives on Computer Concepts / New Perspectives on Computer Concepts.iso / np2010c / page793.pag < prev    next >
Portable Network Graphic  |  2008-10-02  |  87KB  |  817x1045  |  8-bit (256 colors)
Labels: book | chat room | hakham | monitor | sky | web site
OCR: COMPUTER PROGRAMMING 7 2 5 SECURE SOFTWARE DEVELOPMENT S possible develop secure software? According to security experts most software security problems can be traced back to defects that programmers unintentionally introduce in software during design and devel- opment The general nature of the defects that open security holes widely known and most can be eliminated Software security begins when the program specifications are formulated. Techniques such as formal methods, threat modeling, attack trees, and defensive programming help programmers remain aware of security throughout the software development life cycle What are formal methods? Formal methods help progra ammers apply rigorous logical and mathematical models to software design coding, testing. and verification. Some software dev ...