Core software security : (Record no. 70839)

000 -LEADER
fixed length control field 02949cam a2200337Ii 4500
001 - CONTROL NUMBER
control field 9781466560963
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 180331t20142014fluad ob 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
ISBN 9781466560963
-- (e-book : PDF)
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
-- (hardback)
082 04 - CLASSIFICATION NUMBER
Call Number 005.8
-- R212
100 1# - AUTHOR NAME
Author Ransome, James F.,
245 10 - TITLE STATEMENT
Title Core software security :
Sub Title security at the source /
300 ## - PHYSICAL DESCRIPTION
Number of Pages 1 online resource
505 0# - FORMATTED CONTENTS NOTE
Remark 2 chapter 1. Introduction -- chapter 2. The secure development lifecycle -- chapter 3. Security assessment (A1) : SDL activities and best practices -- chapter 4. Architecture (A2) : SDL activities and best practices -- chapter 5. Design and development (A3) : SDL activities and best practices -- chapter 6. Design and development (A4) : SDL activities and best practices -- chapter 7. Ship (A5) : SDL activities and best practices -- chapter 8. Post-release support (PRSA1-5) -- chapter 9. Applying the SDL framework to the real world -- chapter 10. Pulling it all together : using the SDL to prevent real-world threats.
520 ## - SUMMARY, ETC.
Summary, etc This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip--
700 1# - AUTHOR 2
Author 2 Misra, Anmol,
700 1# - AUTHOR 2
Author 2 Schoenfield, Brook,
856 40 - ELECTRONIC LOCATION AND ACCESS
Uniform Resource Identifier https://www.taylorfrancis.com/books/9781466560963
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Koha item type eBooks
264 #1 -
-- Boca Raton :
-- Taylor & Francis,
-- [2014]
264 #4 -
-- ©2014
336 ## -
-- text
-- rdacontent
337 ## -
-- computer
-- rdamedia
338 ## -
-- online resource
-- rdacarrier
520 ## - SUMMARY, ETC.
-- Provided by publisher.
650 #0 - SUBJECT ADDED ENTRY--SUBJECT 1
-- Computer security.

No items available.