|
|
|
|
LEADER |
00000cam a2200000Ma 4500 |
001 |
OR_on1125069377 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
191026s2018 xx o 000 0 eng d |
040 |
|
|
|a OTZ
|b eng
|e pn
|c OTZ
|d OCLCQ
|d TOH
|d LVT
|d OCLCQ
|
019 |
|
|
|a 1302277420
|
020 |
|
|
|z 9780738457178
|
020 |
|
|
|z 0738457175
|
024 |
8 |
|
|a 9780738457178
|
029 |
1 |
|
|a AU@
|b 000066232911
|
035 |
|
|
|a (OCoLC)1125069377
|z (OCoLC)1302277420
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Grunbok, Warren,
|e author.
|
245 |
1 |
0 |
|a Security in Development :
|b the IBM Secure Engineering Framework /
|c Grunbok, Warren.
|
250 |
|
|
|a 1st edition.
|
264 |
|
1 |
|b IBM Redbooks,
|c 2018.
|
300 |
|
|
|a 1 online resource (26 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
347 |
|
|
|a text file
|
365 |
|
|
|b 20.00
|
520 |
|
|
|a IBM® has long been recognized as a leading provider of hardware, software, and services that are of the highest quality, reliability, function, and integrity. IBM products and services are used around the world by people and organizations with mission-critical demands for high performance, high stress tolerance, high availability, and high security. As a testament to this long-standing attention at IBM, demonstration of this attention to security can be traced back to the Integrity Statement for IBM mainframe software, which was originally published in 1973: IBM's long-term commitment to System Integrity is unique in the industry, and forms the basis of MVS (now IBM z/OS) industry leadership in system security. IBM MVS (now IBM z/OS) is designed to help you protect your system, data, transactions, and applications from accidental or malicious modification. This is one of the many reasons IBM 360 (now IBM Z) remains the industry's premier data server for mission-critical workloads. This commitment continues to apply to IBM's mainframe systems and is reiterated at the Server RACF General User's Guide web page. The IT market transformed in 40-plus years, and so have product development and information security practices. The IBM commitment to continuously improving product security remains a constant differentiator for the company. In this IBM Redguide™ publication, we describe secure engineering practices for software products. We offer a description of an end-to-end approach to product development and delivery, with security considered. IBM is producing this IBM Redguide publication in the hope that interested parties (clients, other IT companies, academics, and others) can find these practices to be a useful example of the type of security practices that are increasingly a must-have for developing products and applications that run in the world's digital infrastructure. We also hope this publication can enrich our continued collaboration with others in the industry, standards bodies, government, and elsewhere, as we seek to learn and continuously refine our approach.
|
542 |
|
|
|f Copyright 2018 © IBM
|g 2018
|
550 |
|
|
|a Made available through: Safari, an O'Reilly Media Company.
|
588 |
0 |
|
|a Online resource; Title from title page (viewed December 17, 2018).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
700 |
1 |
|
|a Cole, Marie,
|e author.
|
710 |
2 |
|
|a Safari, an O'Reilly Media Company.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780738457178/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|