|
|
|
|
LEADER |
00000cam a2200000Ii 4500 |
001 |
OR_ocn964633680 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr unu|||||||| |
008 |
161130s2017 maua ob 001 0 eng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d STF
|d DEBBG
|d DEBSZ
|d N$T
|d YDX
|d OCLCA
|d OCLCF
|d CEF
|d KSU
|d OCLCQ
|d UKAHL
|d CZL
|d OCLCO
|d OCL
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 1005300531
|
020 |
|
|
|a 9780134189864
|q (electronic bk.)
|
020 |
|
|
|a 0134189868
|q (electronic bk.)
|
020 |
|
|
|z 9780134189857
|
020 |
|
|
|z 013418985X
|
020 |
|
|
|z 9780134189802
|
020 |
|
|
|z 0134189809
|
029 |
1 |
|
|a DEBBG
|b BV043970553
|
029 |
1 |
|
|a DEBSZ
|b 485810271
|
029 |
1 |
|
|a GBVCP
|b 876249403
|
035 |
|
|
|a (OCoLC)964633680
|z (OCoLC)1005300531
|
037 |
|
|
|a CL0500000801
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Mead, Nancy R.,
|e author.
|
245 |
1 |
0 |
|a Cyber security engineering :
|b a practical approach for systems and software assurance /
|c Nancy R. Mead, Carol C. Woody.
|
264 |
|
1 |
|a Boston :
|b Addison-Wesley,
|c [2017]
|
264 |
|
4 |
|c ©2017
|
300 |
|
|
|a 1 online resource :
|b illustrations.
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a SEI series in software engineering
|
588 |
0 |
|
|a Online resource; title from title page (Safari, viewed November 30, 2016).
|
504 |
|
|
|a Includes bibliographical references and index.
|
520 |
|
|
|a Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software assurance experts Dr. Nancy R. Mead and Dr. Carol C. Woody bring together comprehensive best practices for building software systems that exhibit superior operational security, and for considering security throughout your full system development and acquisition lifecycles. Drawing on their pioneering work at the Software Engineering Institute (SEI) and Carnegie Mellon University, Mead and Woody introduce seven core principles of software assurance, and show how to apply them coherently and systematically. Using these principles, they help you prioritize the wide range of possible security actions available to you, and justify the required investments. Cyber Security Engineering guides you through risk analysis, planning to manage secure software development, building organizational models, identifying required and missing competencies, and defining and structuring metrics. Mead and Woody address important topics, including the use of standards, engineering security requirements for acquiring COTS software, applying DevOps, analyzing malware to anticipate future vulnerabilities, and planning ongoing improvements. This book will be valuable to wide audiences of practitioners and managers with responsibility for systems, software, or quality engineering, reliability, security, acquisition, or operations. Whatever your role, it can help you reduce operational problems, eliminate excessive patching, and deliver software that is more resilient and secure.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Cyberspace
|x Security measures.
|
650 |
|
0 |
|a Database security.
|
650 |
|
0 |
|a Computer software
|x Development
|x Security measures.
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Bases de données
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
|
7 |
|a Cyberspace
|x Security measures
|2 fast
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Database security
|2 fast
|
700 |
1 |
|
|a Woody, Carol C.,
|e author.
|
776 |
0 |
8 |
|i Print version:
|a Mead, Nancy R.
|t Cyber security engineering.
|d ©2017
|z 0134189809
|z 9780134189802
|w (OCoLC)914573627
|
830 |
|
0 |
|a SEI series in software engineering.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780134189857/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32043164
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1601696
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 14856453
|
994 |
|
|
|a 92
|b IZTAP
|