Cargando…

Application security in the ISO 27001:2013 environment /

This book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for informatio...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autores principales: Vasudevan, Vinod (Autor), Mangla, Anoopt (Autor), Ummer, Firosh (Autor), Shetty, Sachin (Autor), Pakala, Sangita (Autor), Anbalahan, Siddharth (Autor)
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Ely, Cambridgeshire, United Kingdom : IT Governance Publishing, 2015.
Edición:Second edition.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 JSTOR_ocn930868404
003 OCoLC
005 20231005004200.0
006 m o d
007 cr unu||||||||
008 151203s2015 enka ob 000 0 eng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d JSTOR  |d B24X7  |d STF  |d EBLCP  |d DEBBG  |d IDB  |d MERUC  |d OCLCQ  |d IOG  |d OCLCA  |d CEF  |d WAU  |d OCLCA  |d AUD  |d YDXCP  |d D6H  |d COO  |d LIV  |d OCLCQ  |d N$T  |d UX1  |d BRF  |d OCLCO  |d OCLCQ 
019 |a 941700561  |a 948787456  |a 948966311  |a 961680470  |a 966374384  |a 1143218657  |a 1175636959 
020 |a 9781849287685  |q (electronic bk.) 
020 |a 1849287686  |q (electronic bk.) 
020 |a 9781849287708  |q (electronic bk.) 
020 |a 1849287708  |q (electronic bk.) 
020 |a 1849287678 
020 |a 9781849287678 
020 |z 9781849287678 
029 1 |a AU@  |b 000068473323 
029 1 |a CHNEW  |b 000895037 
029 1 |a CHNEW  |b 001073335 
029 1 |a CHVBK  |b 579461335 
029 1 |a DEBBG  |b BV043968087 
029 1 |a DEBSZ  |b 485785730 
029 1 |a GBVCP  |b 1048972941 
029 1 |a GBVCP  |b 882746928 
035 |a (OCoLC)930868404  |z (OCoLC)941700561  |z (OCoLC)948787456  |z (OCoLC)948966311  |z (OCoLC)961680470  |z (OCoLC)966374384  |z (OCoLC)1143218657  |z (OCoLC)1175636959 
037 |a CL0500000679  |b Safari Books Online 
037 |a 22573/ctt18dd764  |b JSTOR 
050 4 |a QA76.9.A25 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Vasudevan, Vinod,  |e author. 
245 1 0 |a Application security in the ISO 27001:2013 environment /  |c Vinod Vasudevan, Anoop Mangla, Firosh Ummer, Sachin Shetty, Sangita Pakala, Siddharth Anbalahan. 
250 |a Second edition. 
264 1 |a Ely, Cambridgeshire, United Kingdom :  |b IT Governance Publishing,  |c 2015. 
300 |a 1 online resource (1 volume) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
588 0 |a Online resource; title from title page (Safari, viewed November 30, 2015). 
520 |a This book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO27001. Methods used by criminal hackers to attack organisations via their web applications and a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO27001 are provided. This edition is updated to reflect ISO27001:2013 as well as best practices relating to cryptography, including the PCI SSC's denigration of SSL in favour of TLS. --  |c Edited summary from book. 
505 0 |a Cover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources. 
504 |a Includes bibliographical references. 
590 |a JSTOR  |b Books at JSTOR Demand Driven Acquisitions (DDA) 
590 |a JSTOR  |b Books at JSTOR Evidence Based Acquisitions 
590 |a JSTOR  |b Books at JSTOR All Purchased 
650 0 |a Computer security. 
650 0 |a Software engineering. 
650 0 |a Computer networks  |x Security measures. 
650 0 |a Data encryption (Computer science) 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Génie logiciel. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 6 |a Chiffrement (Informatique) 
650 7 |a Computer networks  |x Security measures.  |2 fast  |0 (OCoLC)fst00872341 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Data encryption (Computer science)  |2 fast  |0 (OCoLC)fst00887935 
650 7 |a Software engineering.  |2 fast  |0 (OCoLC)fst01124185 
700 1 |a Mangla, Anoopt,  |e author. 
700 1 |a Ummer, Firosh,  |e author. 
700 1 |a Shetty, Sachin,  |e author. 
700 1 |a Pakala, Sangita,  |e author. 
700 1 |a Anbalahan, Siddharth,  |e author. 
776 0 8 |i Print version:  |a Vasudevan, Vinod.  |t Application Security in the ISO 27001:2013 Environment.  |d : IT Governance Publishing, ©2015  |z 9781849287678 
856 4 0 |u https://jstor.uam.elogim.com/stable/10.2307/j.ctt19qgf1f  |z Texto completo 
938 |a Books 24x7  |b B247  |n bks00104107 
938 |a EBL - Ebook Library  |b EBLB  |n EBL4395800 
938 |a EBSCOhost  |b EBSC  |n 1092754 
938 |a YBP Library Services  |b YANK  |n 12691341 
994 |a 92  |b IZTAP