Cargando…

Core software security : security at the source /

"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Ransome, James F. (Autor), Misra, Anmol (Autor), Schoenfield, Brook S. E. (Autor)
Otros Autores: Schmidt, Howard A. (writer of foreword.)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton : CRC Press, Taylor & Francis Group, [2014]
Temas:
Acceso en línea:Texto completo
Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBOOKCENTRAL_ocn869311301
003 OCoLC
005 20240329122006.0
006 m o d
007 cr mn|||||||||
008 131227t20142014flua ob 001 0 eng d
010 |z  2013042460 
040 |a FlBoTFG  |b eng  |e rda  |e pn  |c STF  |d CEF  |d VLB  |d IDEBK  |d N$T  |d OSU  |d YDXCP  |d B24X7  |d COO  |d UMI  |d DEBBG  |d DEBSZ  |d EBLCP  |d CNSPO  |d CRCPR  |d OCLCF  |d SINTU  |d OCLCQ  |d GGVRL  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCQ  |d UAB  |d OCLCA  |d OCLCQ  |d U3W  |d NLE  |d AU@  |d OCLCQ  |d UKMGB  |d WYU  |d YDX  |d IDB  |d LEAUB  |d TYFRS  |d OCLCQ  |d UKAHL  |d VT2  |d OCLCQ  |d NLW  |d OCLCQ  |d LND  |d U@J  |d ELBRO  |d OCLCO  |d XII  |d OCLCQ  |d SFB  |d INARC  |d OCLCQ  |d OCLCO  |d OCLCQ 
015 |a GBB7A1412  |2 bnb 
016 7 |a 018373220  |2 Uk 
019 |a 866440935  |a 868855779  |a 892117623  |a 907643904  |a 918881374  |a 966355422  |a 1065727599  |a 1103253168  |a 1129353861  |a 1153005261  |a 1192329616  |a 1228596581  |a 1240530706  |a 1391403410 
020 |a 9781466560963  |q (eBook - PDF) 
020 |a 1466560967  |q (eBook - PDF) 
020 |z 9781466560956  |q (hardback) 
020 |z 1466560959  |q (hardback) 
029 1 |a AU@  |b 000052959514 
029 1 |a AU@  |b 000053310608 
029 1 |a AU@  |b 000062349444 
029 1 |a AU@  |b 000069373828 
029 1 |a CHNEW  |b 000899375 
029 1 |a CHVBK  |b 403392381 
029 1 |a DEBBG  |b BV042182727 
029 1 |a DEBSZ  |b 399567836 
029 1 |a DEBSZ  |b 417234147 
029 1 |a DEBSZ  |b 43156213X 
029 1 |a DEBSZ  |b 463015029 
029 1 |a GBVCP  |b 882734326 
029 1 |a UKMGB  |b 018373220 
035 |a (OCoLC)869311301  |z (OCoLC)866440935  |z (OCoLC)868855779  |z (OCoLC)892117623  |z (OCoLC)907643904  |z (OCoLC)918881374  |z (OCoLC)966355422  |z (OCoLC)1065727599  |z (OCoLC)1103253168  |z (OCoLC)1129353861  |z (OCoLC)1153005261  |z (OCoLC)1192329616  |z (OCoLC)1228596581  |z (OCoLC)1240530706  |z (OCoLC)1391403410 
037 |a CL0500000486  |b Safari Books Online 
050 4 |a QA76.9.A25  |b R356 2014 
072 7 |a COM  |x 060040  |2 bisacsh 
072 7 |a COM  |x 043050  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |b R212 
084 |a COM051230  |a COM053000  |2 bisacsh 
049 |a UAMI 
100 1 |a Ransome, James F.,  |e author. 
245 1 0 |a Core software security :  |b security at the source /  |c James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt. 
264 1 |a Boca Raton :  |b CRC Press, Taylor & Francis Group,  |c [2014] 
264 4 |c ©2014 
300 |a 1 online resource (xxvi, 388 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
520 |a "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--  |c Provided by publisher 
504 |a Includes bibliographical references and index. 
505 0 |a The secure development lifecycle -- Security assessment (A1): SDL activities and best practices -- Architecture (A2): SDL activities and best practices -- Design and development (A3): SDL activities and best practices -- Design and development (A4): SDL activities and best practices -- Ship (A5): SDL activities and best practices -- Post-release support (PRSA1-5) -- Applying the SDL framework to the real world -- Pulling it all together: using the SDL to prevent real-world threats. 
588 0 |a Print version record. 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 6 |a Sécurité informatique. 
650 7 |a COMPUTERS  |x Internet  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Networking  |x Security.  |2 bisacsh 
650 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
700 1 |a Misra, Anmol,  |e author. 
700 1 |a Schoenfield, Brook S. E.,  |e author. 
700 1 |a Schmidt, Howard A.,  |e writer of foreword. 
776 0 8 |i Print version:  |a Ransome, James F.  |t Core software security.  |d Boca Raton : Taylor & Francis, 2014  |z 9781466560956  |w (DLC) 2013042460  |w (OCoLC)785869281 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=1547083  |z Texto completo 
856 4 0 |u https://learning.oreilly.com/library/view/~/9781466560963/?ar  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH35258337 
938 |a Askews and Holts Library Services  |b ASKH  |n AH25300603 
938 |a Books 24x7  |b B247  |n bks00051951 
938 |a EBL - Ebook Library  |b EBLB  |n EBL1547083 
938 |a EBSCOhost  |b EBSC  |n 677112 
938 |a eLibro  |b ELBO  |n ELB147469 
938 |a Cengage Learning  |b GVRL  |n GVRL8QBN 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis27624135 
938 |a Taylor & Francis  |b TAFR  |n 9781466560963 
938 |a Taylor & Francis  |b TAFR  |n AUP0KE20638PDF 
938 |a YBP Library Services  |b YANK  |n 15857562 
938 |a YBP Library Services  |b YANK  |n 10750180 
938 |a Internet Archive  |b INAR  |n coresoftwaresecu0000rans 
994 |a 92  |b IZTAP