Cargando…

Intro to secure software : building security systems /

"It's an unfortunate truism that many good developers are bad at software security. They cling to the belief that security is something you can just buy and bolt on, but that's not the case. It's not that developers want to be bad at security, they just don't know where to s...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly, 2016.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_ocn945699454
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 160330s2016 xx 177 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCQ  |d OCLCA  |d UAB  |d OCLCO 
035 |a (OCoLC)945699454 
037 |a CL0500000728  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Sletten, Brian,  |e on-screen presenter. 
245 1 0 |a Intro to secure software :  |b building security systems /  |c with Brian Sletten. 
264 1 |a [Place of publication not identified] :  |b O'Reilly,  |c 2016. 
300 |a 1 online resource (1 streaming video file (8 hr., 12 min., 20 sec.)) 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from title screen (Safari, viewed March 29, 2016). 
511 0 |a On-screen presenter, Brian Sletten. 
520 |a "It's an unfortunate truism that many good developers are bad at software security. They cling to the belief that security is something you can just buy and bolt on, but that's not the case. It's not that developers want to be bad at security, they just don't know where to start and where they should go. This video offers a clear route. It begins with a high level overview of today's security threats and the organizational strategies used to counter those threats; it details the roles that SSG members, developers, testers and operations personnel must perform in a security focused SDLC; and finishes with a survey of the protocols, tactics, and tools used to optimize security at the physical, network, application, and perimeter levels."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
856 4 0 |u https://learning.oreilly.com/videos/~/9781491943595/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP