Re: [SC-L] Secure Programming with Static Analysis

2007-07-09 Thread Gary McGraw
Both good ideas.   Feel free to ping your friends and enemies with the URL.

I would like to see an in depth book on each of the touchpoints.   So far, the 
chess/west book covers code review.  My next choice would be a book on 
architectural risk analysis.

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
blog www.cigital.com/justiceleague
book www.swsec.com



Sent from my treo.

 -Original Message-
From:   McGovern, James F (HTSC, IT) [mailto:[EMAIL PROTECTED]
Sent:   Monday, July 09, 2007 03:00 PM Eastern Standard Time
To: sc-l@securecoding.org
Subject:Re: [SC-L] Secure Programming with Static Analysis

If you are seeking additional book ideas for this series, may I suggest
posting to [EMAIL PROTECTED]

There are two books that I would love to see:

- Designing Secure Software - Not everything is about the code
- Procuring Secure Software - Most enterprises nowadays buy software vs
build it


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gary McGraw
Sent: Thursday, July 05, 2007 9:01 AM
To: 'Brian Chess'; 'sc-l@securecoding.org'
Subject: Re: [SC-L] Secure Programming with Static Analysis

Hi sc-l,

I have read this awesome book (more than once) and can vouch for it.  It
is an important part of the addison-wesley software security series, the
series that includes:
Software Security www.swsec.com
Rootkits
Exploiting Software
Building Secure Software
(and any day now Exploiting Online Games)

For more on the series, see www.buildingsecurityin.com.  We are always
on the lookout for more titles for the series, especially if they dive
deeply into one of the seven touchpoints, so if you have a book idea
please let me know.

Meanwhile, click on this link and buy Brian and Jacob's book:
http://www.amazon.com/dp/0321424778

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
blog www.cigital.com/justiceleague
book www.swsec.com



*
This communication, including attachments, is
for the exclusive use of addressee and may contain proprietary,
confidential and/or privileged information.  If you are not the intended
recipient, any use, copying, disclosure, dissemination or distribution is
strictly prohibited.  If you are not the intended recipient, please notify
the sender immediately by return e-mail, delete this communication and
destroy all copies.
*


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Secure Programming with Static Analysis

2007-07-09 Thread Julie Ryan
The US Dept of Defense has done some work on the procurement side of  
the problem.  Here are two papers for those in very large  
bureaucracies who might be interested:

Best Software Assurance Practices in Acquisition of Trusted Systems
http://www.cisse.info/colloquia/cisse10/proceedings10/pdfs/papers/ 
S02P03.pdf

Software Assurance: Five Essential Considerations for Acquisition  
Officials
http://www.stsc.hill.af.mil/CrossTalk/2007/05/0705PolydysWisseman.html

On Jul 9, 2007, at 1:16 PM, McGovern, James F (HTSC, IT) wrote:

> If you are seeking additional book ideas for this series, may I  
> suggest
> posting to [EMAIL PROTECTED]
>
> There are two books that I would love to see:
>
> - Designing Secure Software - Not everything is about the code
> - Procuring Secure Software - Most enterprises nowadays buy  
> software vs
> build it
>
>
> -Original Message-
> From: [EMAIL PROTECTED]
> [mailto:[EMAIL PROTECTED] On Behalf Of Gary McGraw
> Sent: Thursday, July 05, 2007 9:01 AM
> To: 'Brian Chess'; 'sc-l@securecoding.org'
> Subject: Re: [SC-L] Secure Programming with Static Analysis
>
> Hi sc-l,
>
> I have read this awesome book (more than once) and can vouch for  
> it.  It
> is an important part of the addison-wesley software security  
> series, the
> series that includes:
> Software Security www.swsec.com
> Rootkits
> Exploiting Software
> Building Secure Software
> (and any day now Exploiting Online Games)
>
> For more on the series, see www.buildingsecurityin.com.  We are always
> on the lookout for more titles for the series, especially if they dive
> deeply into one of the seven touchpoints, so if you have a book idea
> please let me know.
>
> Meanwhile, click on this link and buy Brian and Jacob's book:
> http://www.amazon.com/dp/0321424778
>
> gem
>
> company www.cigital.com
> podcast www.cigital.com/silverbullet
> blog www.cigital.com/justiceleague
> book www.swsec.com
>
>
>
> ** 
> ***
> This communication, including attachments, is
> for the exclusive use of addressee and may contain proprietary,
> confidential and/or privileged information.  If you are not the  
> intended
> recipient, any use, copying, disclosure, dissemination or  
> distribution is
> strictly prohibited.  If you are not the intended recipient, please  
> notify
> the sender immediately by return e-mail, delete this communication and
> destroy all copies.
> ** 
> ***
>
>
> ___
> Secure Coding mailing list (SC-L) SC-L@securecoding.org
> List information, subscriptions, etc - http://krvw.com/mailman/ 
> listinfo/sc-l
> List charter available at - http://www.securecoding.org/list/ 
> charter.php
> SC-L is hosted and moderated by KRvW Associates, LLC (http:// 
> www.KRvW.com)
> as a free, non-commercial service to the software security community.
> ___


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Secure Programming with Static Analysis

2007-07-09 Thread McGovern, James F (HTSC, IT)
If you are seeking additional book ideas for this series, may I suggest
posting to [EMAIL PROTECTED]

There are two books that I would love to see:

- Designing Secure Software - Not everything is about the code
- Procuring Secure Software - Most enterprises nowadays buy software vs
build it 


-Original Message-
From: [EMAIL PROTECTED]
[mailto:[EMAIL PROTECTED] On Behalf Of Gary McGraw
Sent: Thursday, July 05, 2007 9:01 AM
To: 'Brian Chess'; 'sc-l@securecoding.org'
Subject: Re: [SC-L] Secure Programming with Static Analysis

Hi sc-l,

I have read this awesome book (more than once) and can vouch for it.  It
is an important part of the addison-wesley software security series, the
series that includes:
Software Security www.swsec.com
Rootkits
Exploiting Software
Building Secure Software
(and any day now Exploiting Online Games)

For more on the series, see www.buildingsecurityin.com.  We are always
on the lookout for more titles for the series, especially if they dive
deeply into one of the seven touchpoints, so if you have a book idea
please let me know.

Meanwhile, click on this link and buy Brian and Jacob's book:
http://www.amazon.com/dp/0321424778

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
blog www.cigital.com/justiceleague
book www.swsec.com



*
This communication, including attachments, is
for the exclusive use of addressee and may contain proprietary,
confidential and/or privileged information.  If you are not the intended
recipient, any use, copying, disclosure, dissemination or distribution is
strictly prohibited.  If you are not the intended recipient, please notify
the sender immediately by return e-mail, delete this communication and
destroy all copies.
*


___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


Re: [SC-L] Secure Programming with Static Analysis

2007-07-05 Thread Gary McGraw
Hi sc-l,

I have read this awesome book (more than once) and can vouch for it.  It is an 
important part of the addison-wesley software security series, the series that 
includes:
Software Security www.swsec.com
Rootkits
Exploiting Software
Building Secure Software
(and any day now Exploiting Online Games)

For more on the series, see www.buildingsecurityin.com.  We are always on the 
lookout for more titles for the series, especially if they dive deeply into one 
of the seven touchpoints, so if you have a book idea please let me know.

Meanwhile, click on this link and buy Brian and Jacob's book:
http://www.amazon.com/dp/0321424778

gem

company www.cigital.com
podcast www.cigital.com/silverbullet
blog www.cigital.com/justiceleague
book www.swsec.com




Sent from my treo.

 -Original Message-
From:   Brian Chess [mailto:[EMAIL PROTECTED]
Sent:   Thursday, July 05, 2007 06:11 AM Eastern Standard Time
To: sc-l@securecoding.org
Subject:    [SC-L] Secure Programming with Static Analysis

Jacob West and I are proud to announce that our book, Secure Programming
with Static Analysis, is now available.

http://www.amazon.com/dp/0321424778

The book covers a lot of ground.
* It explains why static source code analysis is a critical part of a secure
development process.
* It shows how static analysis tools work, what makes one tool better than
another, and how to integrate static analysis into the SDLC.
* It details a tremendous number of vulnerability categories, using
real-world examples from programs such as Sendmail, Tomcat, Adobe Acrobat,
Mac OSX, and dozens of others.

We'd like to thank the many members of the sc-l list who helped us out with
the book in one way or another, including:
  Pravir Chandra
  Gary McGraw
  Katrina O'Neil
  John Steven
  Ken van Wyk

Regards,
Brian and Jacob

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___


[SC-L] Secure Programming with Static Analysis

2007-07-05 Thread Brian Chess
Jacob West and I are proud to announce that our book, Secure Programming
with Static Analysis, is now available.

http://www.amazon.com/dp/0321424778

The book covers a lot of ground.
* It explains why static source code analysis is a critical part of a secure
development process.
* It shows how static analysis tools work, what makes one tool better than
another, and how to integrate static analysis into the SDLC.
* It details a tremendous number of vulnerability categories, using
real-world examples from programs such as Sendmail, Tomcat, Adobe Acrobat,
Mac OSX, and dozens of others.

We'd like to thank the many members of the sc-l list who helped us out with
the book in one way or another, including:
  Pravir Chandra
  Gary McGraw
  Katrina O'Neil
  John Steven
  Ken van Wyk

Regards,
Brian and Jacob

___
Secure Coding mailing list (SC-L) SC-L@securecoding.org
List information, subscriptions, etc - http://krvw.com/mailman/listinfo/sc-l
List charter available at - http://www.securecoding.org/list/charter.php
SC-L is hosted and moderated by KRvW Associates, LLC (http://www.KRvW.com)
as a free, non-commercial service to the software security community.
___