000 02949cam a2200337Ii 4500
001 9781466560963
008 180331t20142014fluad ob 001 0 eng d
020 _a9781466560963
_q(e-book : PDF)
020 _z9781466560956
_q(hardback)
024 7 _a10.1201/b16134
_2doi
035 _a(OCoLC)866440935
040 _aFlBoTFG
_cFlBoTFG
_erda
050 4 _aQA76.9.A25
_bR356 2014
082 0 4 _a005.8
_bR212
100 1 _aRansome, James F.,
_eauthor.
_914958
245 1 0 _aCore software security :
_bsecurity at the source /
_cJames Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt.
264 1 _aBoca Raton :
_bTaylor & Francis,
_c[2014]
264 4 _c©2014
300 _a1 online resource
336 _atext
_2rdacontent
337 _acomputer
_2rdamedia
338 _aonline resource
_2rdacarrier
505 0 _achapter 1. Introduction -- chapter 2. The secure development lifecycle -- chapter 3. Security assessment (A1) : SDL activities and best practices -- chapter 4. Architecture (A2) : SDL activities and best practices -- chapter 5. Design and development (A3) : SDL activities and best practices -- chapter 6. Design and development (A4) : SDL activities and best practices -- chapter 7. Ship (A5) : SDL activities and best practices -- chapter 8. Post-release support (PRSA1-5) -- chapter 9. Applying the SDL framework to the real world -- chapter 10. Pulling it all together : using the SDL to prevent real-world threats.
520 _aThis book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip--
_cProvided by publisher.
650 0 _aComputer security.
_93970
700 1 _aMisra, Anmol,
_eauthor.
_914959
700 1 _aSchoenfield, Brook,
_eauthor.
_914960
776 0 8 _iPrint version:
_z9781466560956
_w(DLC) 2013042460
856 4 0 _uhttps://www.taylorfrancis.com/books/9781466560963
_zClick here to view.
942 _cEBK
999 _c70839
_d70839