This chapter covers about the application security practices that should be applied in verification and deployment phase.
Chapter 06 - 20CS54I
· 21 min read
This chapter covers about the application security practices that should be applied in verification and deployment phase.
This chapter covers SDLC, SSDLC, life cycle models, Microsoft's practices in accordance to SSDLC, and security requirements in software development, also covers Threat modeling.