O'Reilly logo

Security Development Lifecycle by Steve Lipner, Michael Howard

Stay ahead with the world's most comprehensive technology and business learning platform.

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, tutorials, and more.

Start Free Trial

No credit card required

Chapter 10. Stage 5: Creating Security Documents, Tools, and Best Practices for Customers

In this chapter:

In mid-2005, one of us (Howard) had a conversation with a Fortune 100 customer about an interesting trend in compromised Web servers. After the CodeRed and Nimda worms (CERT 2001a; CERT 2001b) struck in July and September 2001, respectively, affecting Microsoft Web servers, Microsoft Internet Information Services (IIS) 4 and IIS 5 became the most compromised Web servers on the Internet. This led Gartner Vice-President John Pescatore to advise Gartner clients to seriously consider not using either Web server (Gartner 2001) and to use other Web ...

With Safari, you learn the way you learn best. Get unlimited access to videos, live online training, learning paths, books, interactive tutorials, and more.

Start Free Trial

No credit card required