Feisty orphan Pippa de Lacey lives by wit and skill as a London street performer. But when her sharp tongue gets her into serious trouble, she throws herself upon the mercy of Irish chieftain Aidan O'Donoghue. Pippa provides a welcome diversion for Aidan as he awaits an audience with the queen, who holds his people's fate in her hands. Amused at first, he becomes obsessed with the audacious waif who claims his patronage. Rash and impetuous, their unlikely alliance reverberates with desire and th...
Feisty orphan Pippa de Lacey lives by wit and skill as a London street performer. But when her sharp tongue gets her into serious trouble, she throws herself upon the mercy of Irish chieftain Aidan O'Donoghue. Pippa provides a welcome diversion for Aidan as he awaits an audience with the queen, who holds his people's fate in her hands. Amused at first, he becomes obsessed with the audacious waif who claims his patronage. Rash and impetuous, their unlikely alliance reverberates with desire and the tantalizing promise of a life each has always wanted--but never dreamed of attaining.
Table Of Content
Table Of Content:
Foreword xix Preface xxiii Acknowledgments xxxi About the Author xxxvPart I: Software Security Fundamentals 1Chapter 1: Defining a Discipline 3The Security Problem 4 Security Problems in Software 14 Solving the Problem: The Three Pillars of Software Security 25 The Rise of Security Engineering 37 Chapter 2: A Risk Management Framework 39Putting Risk Management into Practice 40 How to Use This Chapter 41 The Five Stages of Activity 42 The RMF Is a Multilevel Loop 46 Applying the RMF: KillerAppCo's iWare 1.0 Server 48 The Importance of Measurement 73 The Cigital Workbench 76 Risk Management Is a Framework for Software Security 79 Part II: Seven Touchpoints for Software Security 81Chapter 3: Introduction to Software Security Touchpoints 83Flyover: Seven Terrific Touchpoints 86 Black and White: Two Threads Inextricably Intertwined 89 Moving Left 91 Touchpoints as Best Practices 94 Who Should Do Software Security? 96 Software Security Is a Multidisciplinary Effort 100 Touchpoints to Success 103 Chapter 4: Code Review with a Tool 105Catching Implementation Bugs Early (with a Tool) 106 Aim for Good