|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
JSTOR_ocn930868404 |
003 |
OCoLC |
005 |
20231005004200.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
151203s2015 enka ob 000 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d JSTOR
|d B24X7
|d STF
|d EBLCP
|d DEBBG
|d IDB
|d MERUC
|d OCLCQ
|d IOG
|d OCLCA
|d CEF
|d WAU
|d OCLCA
|d AUD
|d YDXCP
|d D6H
|d COO
|d LIV
|d OCLCQ
|d N$T
|d UX1
|d BRF
|d OCLCO
|d OCLCQ
|
019 |
|
|
|a 941700561
|a 948787456
|a 948966311
|a 961680470
|a 966374384
|a 1143218657
|a 1175636959
|
020 |
|
|
|a 9781849287685
|q (electronic bk.)
|
020 |
|
|
|a 1849287686
|q (electronic bk.)
|
020 |
|
|
|a 9781849287708
|q (electronic bk.)
|
020 |
|
|
|a 1849287708
|q (electronic bk.)
|
020 |
|
|
|a 1849287678
|
020 |
|
|
|a 9781849287678
|
020 |
|
|
|z 9781849287678
|
029 |
1 |
|
|a AU@
|b 000068473323
|
029 |
1 |
|
|a CHNEW
|b 000895037
|
029 |
1 |
|
|a CHNEW
|b 001073335
|
029 |
1 |
|
|a CHVBK
|b 579461335
|
029 |
1 |
|
|a DEBBG
|b BV043968087
|
029 |
1 |
|
|a DEBSZ
|b 485785730
|
029 |
1 |
|
|a GBVCP
|b 1048972941
|
029 |
1 |
|
|a GBVCP
|b 882746928
|
035 |
|
|
|a (OCoLC)930868404
|z (OCoLC)941700561
|z (OCoLC)948787456
|z (OCoLC)948966311
|z (OCoLC)961680470
|z (OCoLC)966374384
|z (OCoLC)1143218657
|z (OCoLC)1175636959
|
037 |
|
|
|a CL0500000679
|b Safari Books Online
|
037 |
|
|
|a 22573/ctt18dd764
|b JSTOR
|
050 |
|
4 |
|a QA76.9.A25
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Vasudevan, Vinod,
|e author.
|
245 |
1 |
0 |
|a Application security in the ISO 27001:2013 environment /
|c Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan.
|
250 |
|
|
|a Second edition.
|
264 |
|
1 |
|a Ely, Cambridgeshire, United Kingdom :
|b IT Governance Publishing,
|c 2015.
|
300 |
|
|
|a 1 online resource (1 volume) :
|b illustrations
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed November 30, 2015).
|
520 |
|
|
|a This book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO27001. Methods used by criminal hackers to attack organisations via their web applications and a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO27001 are provided. This edition is updated to reflect ISO27001:2013 as well as best practices relating to cryptography, including the PCI SSC's denigration of SSL in favour of TLS. --
|c Edited summary from book.
|
505 |
0 |
|
|a Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources.
|
504 |
|
|
|a Includes bibliographical references.
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Demand Driven Acquisitions (DDA)
|
590 |
|
|
|a JSTOR
|b Books at JSTOR Evidence Based Acquisitions
|
590 |
|
|
|a JSTOR
|b Books at JSTOR All Purchased
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer networks
|x Security measures.
|
650 |
|
0 |
|a Data encryption (Computer science)
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Génie logiciel.
|
650 |
|
6 |
|a Réseaux d'ordinateurs
|x Sécurité
|x Mesures.
|
650 |
|
6 |
|a Chiffrement (Informatique)
|
650 |
|
7 |
|a Computer networks
|x Security measures.
|2 fast
|0 (OCoLC)fst00872341
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Data encryption (Computer science)
|2 fast
|0 (OCoLC)fst00887935
|
650 |
|
7 |
|a Software engineering.
|2 fast
|0 (OCoLC)fst01124185
|
700 |
1 |
|
|a Mangla, Anoopt,
|e author.
|
700 |
1 |
|
|a Ummer, Firosh,
|e author.
|
700 |
1 |
|
|a Shetty, Sachin,
|e author.
|
700 |
1 |
|
|a Pakala, Sangita,
|e author.
|
700 |
1 |
|
|a Anbalahan, Siddharth,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Vasudevan, Vinod.
|t Application Security in the ISO 27001:2013 Environment.
|d : IT Governance Publishing, ©2015
|z 9781849287678
|
856 |
4 |
0 |
|u https://jstor.uam.elogim.com/stable/10.2307/j.ctt19qgf1f
|z Texto completo
|
938 |
|
|
|a Books 24x7
|b B247
|n bks00104107
|
938 |
|
|
|a EBL - Ebook Library
|b EBLB
|n EBL4395800
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1092754
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 12691341
|
994 |
|
|
|a 92
|b IZTAP
|