This book covers security fundamentals, security requirements, secure design concepts, secure coding (plus a guideline they can keep), solutions to the OWASP Top Ten items not covered aby the secure coding guidelines.
It also covers the basics of threat