Articles by Michael
-
Cloud-based Solutions, Threat Modeling and Shared Security Responsibility
Cloud-based Solutions, Threat Modeling and Shared Security Responsibility
By Michael Howard
Activity
-
View my verified achievement from Microsoft CET Global Speaker Program.
View my verified achievement from Microsoft CET Global Speaker Program.
Liked by Michael Howard
-
Happy to announce that Zoe Tng, a 14yo middle schooler, has obtained the Microsoft Azure AI-900 certification!!
Happy to announce that Zoe Tng, a 14yo middle schooler, has obtained the Microsoft Azure AI-900 certification!!
Liked by Michael Howard
-
I just got done reading this, 5/5 stars. Great read, nerdy in all the right places, and general where it matters. TPMs are complex beasts, and this…
I just got done reading this, 5/5 stars. Great read, nerdy in all the right places, and general where it matters. TPMs are complex beasts, and this…
Shared by Michael Howard
Licenses & Certifications
Publications
-
Security Best Practices For Developing Windows Azure Applications
Microsoft
This paper focuses on the security challenges and recommended approaches to design and develop more secure applications for Microsoft’s Windows Azure platform.
Other authorsSee publication -
24 Deadly Sins of Software Security
McGraw Hill
"What makes this book so important is that it reflects the experiences of two of the industry's most experienced hands at getting real-world engineers to understand just what they're being asked for when they're asked to write secure code. The book reflects Michael Howard's and David LeBlanc's experience in the trenches working with developers years after code was long since shipped, informing them of problems."
--From the Foreword by Dan KaminskyOther authorsSee publication -
Writing Secure Code for Windows Vista
Microsoft Press
Get the definitive guide to writing more-secure code for Windows Vistaâfrom the authors of the award-winning Writing Secure Code, Michael Howard and David LeBlanc. This reference is ideal for developers who understand the fundamentals of Windows programming and APIs. It complements Writing Secure Code, examining the delta between Windows XP and Windows Vista security. You get first-hand insights into design decisions, lessons learned from Windows Vista development, and practical advice for…
Get the definitive guide to writing more-secure code for Windows Vistaâfrom the authors of the award-winning Writing Secure Code, Michael Howard and David LeBlanc. This reference is ideal for developers who understand the fundamentals of Windows programming and APIs. It complements Writing Secure Code, examining the delta between Windows XP and Windows Vista security. You get first-hand insights into design decisions, lessons learned from Windows Vista development, and practical advice for solving real-world security issues.
Other authorsSee publication -
The Security Development Lifecycle: SDL: A Process for Developing Demonstrably More Secure Software
Microsoft Press
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a…
Your customers demand and deserve better security and privacy in their software. This book is the first to detail a rigorous, proven methodology that measurably minimizes security bugs—the Security Development Lifecycle (SDL). In this long-awaited book, security experts Michael Howard and Steve Lipner from the Microsoft Security Engineering Team guide you through each stage of the SDL—from education and design to testing and post-release. You get their first-hand insights, best practices, a practical history of the SDL, and lessons to help you implement the SDL in any development organization.
Other authors -
-
19 Deadly Sins of Software Security
McGraw Hill
This essential book for all software developers--regardless of platform, language, or type of application--outlines the “19 deadly sins” of software security and shows how to fix each one. Best-selling authors Michael Howard and David LeBlanc, who teach Microsoft employees how to secure code, have partnered with John Viega, the man who uncovered the 19 deadly programming sins to write this much-needed book.
Other authorsSee publication -
Writing Secure Code, 2nd Ed
Microsoft Press
-
Writing Secure Code
Microsoft Press
WRITING SECURE CODE reveals the battle-tested secrets of two veritable code warriors–directly from the trenches of large-scale commercial software development. It's all here–from design pointers to specific code snippets, DCOM to .NET, the Win32® API to Web programming security, and more. Don't even consider going live with a Win32 application on the Internet without reading this book.
Other authorsSee publication -
Designing Secure Web-Based Applications for Microsoft Windows 2000
Microsoft Press
Security features is a strength of Microsoft Windows 2000, but until now, no one has presented a complete picture of Windows 2000 Web server, component-level, and database security features and considerations. DESIGNING SECURE WEB-BASED APPLICATIONS FOR MICROSOFT WINDOWS 2000 offers an integrated, authoritative, pragmatic, end-to-end view of Windows 2000 security topics. The book starts by providing a solid foundation in Windows 2000 security theory and concepts, explaining the key software…
Security features is a strength of Microsoft Windows 2000, but until now, no one has presented a complete picture of Windows 2000 Web server, component-level, and database security features and considerations. DESIGNING SECURE WEB-BASED APPLICATIONS FOR MICROSOFT WINDOWS 2000 offers an integrated, authoritative, pragmatic, end-to-end view of Windows 2000 security topics. The book starts by providing a solid foundation in Windows 2000 security theory and concepts, explaining the key software design considerations for various categories and levels of security, and showing how isolated security "islands" interact. It explains core security issues such as risk analysis, threats, authentication, authorization, and privacy, and then discusses ways to apply the appropriate security to an application to mitigate risk. It covers a range of security technologies such as NTLM authentication, Kerberos authentication, SSL/TLS, CryptoAPI, ACLs, Active Directory(tm), Certificates, Web security capabilities, and COM+ security. Finally, the author uses Web services, certificates, components, and database access to build a Web-based application (included on a companion CD) to show how Windows 2000 security features work in concert to protect applications and data.
Recommendations received
2 people have recommended Michael
Join now to viewMore activity by Michael
-
Yassssss one of the best hacker cons is back next year! 🎉🎉
Yassssss one of the best hacker cons is back next year! 🎉🎉
Liked by Michael Howard
-
Back in the early 2000s, Michael Howard and David LeBlanc's "Writing Secure Code" was educating the industry on crucial cryptographic material…
Back in the early 2000s, Michael Howard and David LeBlanc's "Writing Secure Code" was educating the industry on crucial cryptographic material…
Liked by Michael Howard
-
New blog covering the steps we are taking to help customers during the CrowdStrike outage https://lnkd.in/gsU4CZmy
New blog covering the steps we are taking to help customers during the CrowdStrike outage https://lnkd.in/gsU4CZmy
Liked by Michael Howard
-
I just completed C++ Initialization Story by B. Filipek, it's a good read, I gave it 5 stars. But the fact that a 380pp book exists describing how to…
I just completed C++ Initialization Story by B. Filipek, it's a good read, I gave it 5 stars. But the fact that a 380pp book exists describing how to…
Shared by Michael Howard
-
This is such an important role, and Michael's team is awesome! For anyone with OSS code + security skills, this is a perfect position.
This is such an important role, and Michael's team is awesome! For anyone with OSS code + security skills, this is a perfect position.
Shared by Michael Howard
-
For those of you keeping track :-) (All 3 of you)... My 76th Patent just issued!!!
For those of you keeping track :-) (All 3 of you)... My 76th Patent just issued!!!
Liked by Michael Howard
-
New blog post alert! 🚀 Dive into the world of ledger technology with Azure's latest offerings - Ledger in Azure SQL Database and Azure Confidential…
New blog post alert! 🚀 Dive into the world of ledger technology with Azure's latest offerings - Ledger in Azure SQL Database and Azure Confidential…
Liked by Michael Howard
-
Sorry, did I say 76 patents? It should be 77 - just got another one issued today :-) A number of people asked me how I have been written so many…
Sorry, did I say 76 patents? It should be 77 - just got another one issued today :-) A number of people asked me how I have been written so many…
Liked by Michael Howard
Other similar profiles
Explore collaborative articles
We’re unlocking community knowledge in a new way. Experts add insights directly into each article, started with the help of AI.
Explore MoreOthers named Michael Howard in United States
-
Michael Howard
-
Michael Howard
DoD Transformation and Modernization Evangelist
-
Michael Howard
-
Michael Howard
Vice President & CFO - IBM Power
2364 others named Michael Howard in United States are on LinkedIn
See others named Michael Howard