This book covers security fundamentals, security requirements, secure design concepts, secure coding (plus a guideline they can keep), solutions to the OWASP Top Ten items not covered żeby the secure coding guidelines.
It also covers the basics of threat