Book description
In this fast-advancing technology world, almost everything is written as software or application. Together with the fast-evolving threat landscape, protecting customer data and ensuring the resilience of your business becomes the critical objective of all cybersecurity professionals. Weak application defenses can lead to serious consequences like regulatory fines, penalties, and loss of customer trust—especially for industries that handle sensitive or financial data. That's why it's imperative for security professionals to reinforce themselves with the latest insights to combat growing cyber threats.
In this go-to guide, editors Reet Kaur and Yabing Wang share key concepts, up-to-date best practices, and cutting-edge tools that today's cyber professionals need to ensure solid application security. The articles in this book include actionable advice on a wide variety of application security topics and thought-provoking questions that drive the direction of the field. You'll also receive expert advice from professionals on how to navigate your career within this industry.
Articles include:
- AppSec Is a People Problem—Not a Technical One — Mark S. Merkow
- A Coordinated Approach to a Successful DevSecOps Program — Han Lievens
- Will Passwordless Authentication Save Your Application? — Aldo Salas
- Introduction to CI/CD Pipelines and Associated Risks — Tyler Young
- Unveiling Paths to Account Takeover: Web Cache to XSS Exploitation — Lütfü Mert Ceylan
- Secure the Software Supply Chain Through Transparency — Niels Tanis
- The Right Way to Threat Model — Josh Brown
- Enhanced Application Security Defense — Michael Freeman
- Mobile Security Domain and Best Practices — Aruneesh Salhotra
- API Security Primer — Chenxi Wang
- Will Generative and LLM Solve a 20-Year-Old Problem in Application Security? — Neatsun Ziv
- Application Security in Cyber-Physical Systems — Yaniv Vardi
Publisher resources
Table of contents
- Preface
- I. Program & Practice
- 1. Secure Code for Tomorrow’s Technology
- 2. Pragmatic Advice for Building an Application Security Program
- 3. AppSec Must Lead
- 4. Solving Problems for Application Security
- 5. Securing Your Enterprise Applications
- 6. Developers as Partners in Application Security Strategy
- 7. Be an Awesome Sidekick
- 8. Understanding the True Boundaries of Modern Applications
- 9. Common Best Practices in Application Security
- 10. AppSec Is a People Problem—Not a Technical One
- 11. Empowering Application Security Professionals Through Cybersecurity Education
- 12. Why You Need a Practical Security Champions Program
- 13. The Human Firewall: Combat Enemies by Improving Your Security-Oriented Culture
- 14. Shifting Everywhere in Application Security
- 15. Beyond Barriers: Navigating the Path to a Successful AppSec Program
- II. Secure SDLC
- 16. Building an Application Security Preparation Mindset
- 17. How to Assess Security Mindset in Application Design
- 18. Getting Your Application Ready for the Enterprise
- 19. Reductio Ad Applicationem Securitatis
- 20. Automating the Risk Calculation of Modern Applications
- 21. A Coordinated Approach to a Successful DevSecOps Program
- 22. What Makes Someone a Developer?
- 23. Total AppSec
- 24. You’re More Than Your Job
- 25. TAP Into the Potential of a Great SSDLC Program with Automation
- 26. Vulnerability Researcher to Software Developer: The Other Side of the Coin
- 27. Strategies for Adding Security Rituals to an Existing SDLC
- 28. Challenges and Considerations for Securing Serverless Applications
- 29. Using Offensive Security to Defend Your Application
- 30. Beyond “No”: The Modern Paradigm of Developer-Centric Application Security
- 31. Security Paved Roads
- 32. AppSec in the Cloud Era
- 33. Code Provenance for DevSecOps
- III. Data Security & Privacy
- 34. Will Passwordless Authentication Save Your Application?
- 35. Securing Your Databases: The Importance of Proper Access Controls and Audits
- 36. DataSecOps: Security in Data Products
- 37. Data Security Code and Tests
- 38. Data Security Starts with Good Governance
- 39. Protect Sensitive Data in Modern Applications
- 40. Leverage Data-Flow Analysis in Your Security Practices
- 41. Embracing a Practical Privacy Paradigm Shift in App Development
- 42. Quantum-Safe Encryption Algorithms
- 43. Application Integration Security
- IV. Code Scanning & Testing
- 44. Modern Approach to Software Composition Analysis: Call Graph and Runtime SCA
- 45. Application Security Testing
- 46. WAF and RASP
- 47. Zero Trust Software Architecture
- 48. Rethinking Ethics in Application Security: Toward a Sustainable Digital Future
- 49. Modern WAF Deployment and Management Paradigms
- 50. Do You Need Manual Penetration Testing?
- 51. Bash Your Head
- 52. Exploring Application Security Through Static Analysis
- 53. Introduction to CI/CD Pipelines and Associated Risks
- V. Vulnerability Management
- 54. Demystifying Bug Bounty Programs
- 55. EPSS: A Modern Approach to Vulnerability Management
- 56. Navigating the Waters of Vulnerability Management
- 57. Safeguarding the Digital Nexus: “Top 25 Parameters to Vulnerability Frequency”
- 58. Unveiling Paths to Account Takeover: Web Cache to XSS Exploitation
- 59. Sometimes the Smallest Risks Can Cause the Greatest Destruction
- 60. Effective Vulnerability Remediation Using EPSS
- 61. Bug Bounty—Shift Everywhere
- VI. Software Supply Chain
- 62. Integrating Security into Open Source Dependencies
- 63. Supplier Relationship Management to Reduce Software Supply Chain Security Risk
- 64. Fortifying Open Source AI/ML Libraries: Garden of Security in Software Supply Chain
- 65. SBOM: Transparent, Sustainable Compliance
- 66. Secure the Software Supply Chain Through Transparency
- 67. Unlock the Secrets to Open Source Software Security
- 68. Leverage SBOMs to Enhance Your SSDLC
- VII. Threat Modeling
- 69. Learn to Threat Model
- 70. Understanding OWASP Insecure Design and Unmasking Toxic Combinations
- 71. The Right Way to Threat Model
- 72. Attack Models in SSDLC
- VIII. Threat Intelligence & Incident Response
- 73. In Denial of Your Services
- 74. Sifting for Botnets
- 75. Incident Response for Credential Stuffing Attacks
- 76. Advanced Threat Intelligence Capabilities for Enhanced Application Security Defense
- IX. Mobile Security
- 77. Mobile Security: Domain and Best Practices
- 78. Mobile Application Security Using Containerization
- X. API Security
- 79. API Security: JWE Encryption for Native Data Protection
- 80. APIs Are Windows to the Soul
- 81. API Security: The Bedrock of Modern Applications
- 82. API Security Primer: Visibility
- 83. API Security Primer: Risk Assessment, Monitoring, and Detection
- 84. API Security Primer: Control and Management
- XI. AI Security & Automation
- 85. LLMs Revolutionizing Application Security: Unleashing the Power of AI
- 86. Mitigating Bias and Unfairness in AI-Based Applications
- 87. Secure Development with Generative AI
- 88. Managing the Risks of ChatGPT Integration
- 89. Automation, Automation, and Automation for AppSec
- 90. Will Generative and LLM Solve a 20-Year-Old Problem in Application Security?
- 91. Understand the Risks of Using AI in Application Development
- XII. IoT & Embedded System Security
- 92. Secure Code for Embedded Systems
- 93. Platform Security for Embedded Systems
- 94. Application Identity for Embedded Systems
- 95. Top Five Hacking Methods for IoT Devices
- 96. Securing IoT Applications
- 97. Application Security in Cyber–Physical Systems
- About the Editors
-
Contributors
- Adam Shostack
- Aldo Salas
- Alexander James Wold
- Allen West
- Alyssa Columbus
- Andres Andreu
- Andrew King
- Angelica Lo Duca
- Anuj Parekh
- Aruneesh Salhotra
- Ayman Elsawah
- Brook S.E. Schoenfield
- Caroline Wong
- Cassie Crossley
- Chadi Saliby
- Charan Akiri
- Chenxi Wang
- Chloé Messdaghi
- Christian Ghigliotty
- Daniel Ting
- Darryle Merlette
- David Lindner
- David Stokes
- Diogo Miyake
- Erkang Zheng
- Fayyaz Rajpari
- Han Lievens
- Heather Hinton
- Helen Umberger
- Hussain Syed
- Idan Plotnik
- Izar Tarandach
- Jacqueline Pitter
- Jason Sinchak
- Josh Brown
- Jyothi Charyulu
- Karen Walsh
- Larry W. Cashdollar
- Laura Bell Main
- Lauren Maffeo
- Laxmidhar V. Gaopande
- Louisa Wang
- Luis Arzu
- Lütfü Mert Ceylan
- Manasés Jesús
- Manuel Walder
- Maria Nichole Schwenger
- Mark S. Merkow
- Matthew Coles
- Michael Bray
- Michael Freeman
- Michael Xin
- Nathaniel Shere
- Neatsun Ziv
- Nielet D’mello
- Niels Tanis
- Periklis Gkolias
- Pragat Patel
- Raj Badhwar
- Rakesh Kulkarni
- Sandeep Kumar Singh
- Sausan Yazji
- Sean Poris
- Shawn Evans
- Sounil Yu
- Tanya Janca
- Travis Felder
- Tyler Young
- Vinay Venkatesh
- Viraj Gandhi
- Yaniv Vardi
- Yashvier Kosaraju
- Yasir Ali
Product information
- Title: 97 Things Every Application Security Professional Should Know
- Author(s):
- Release date: June 2024
- Publisher(s): O'Reilly Media, Inc.
- ISBN: 9781098169459
You might also like
book
97 Things Every Information Security Professional Should Know
Whether you're searching for new or additional opportunities, information security can be vast and overwhelming. In …
book
Web Application Security, 2nd Edition
In the first edition of this critically acclaimed book, Andrew Hoffman defined the three pillars of …
book
Grokking Web Application Security
When you launch an application on the web, every hacker in the world has access to …
book
Web Application Security
While many resources for network and IT security are available, detailed knowledge regarding modern web application …