Key Software Security Concepts
Lightweight software security best practices called touchpoints are applied to various software artifacts. By referring only to software artifacts, we can avoid battles over any particular process. See an illustration and more information.
The three pillars of software security are risk management, software security touchpoints, and knowledge. See an illustration and more information.
Seven Pernicious Kingdoms
The seven pernicious kingdoms taxonomy of common software security bugs is introduced in chapter 12. Many examples of specific bugs, along with code samples can be found at vulncat.fortifysoftware.com.
Answers to Appendix A
Copyright © 2006, Gary McGraw