|
|
|
|
LEADER |
00000cgm a2200000Ii 4500 |
001 |
OR_on1155111688 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
cr cna|||||||| |
007 |
vz czazuu |
008 |
200521s2020 xx 043 o vleng d |
040 |
|
|
|a UMI
|b eng
|e rda
|e pn
|c UMI
|d OCLCF
|d OCLCO
|
035 |
|
|
|a (OCoLC)1155111688
|
037 |
|
|
|a CL0501000112
|b Safari Books Online
|
050 |
|
4 |
|a QA76.9.A25
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Everette, Wendy Knox,
|e on-screen presenter.
|
245 |
1 |
0 |
|a Security engineering 101 :
|b when good design and security work together /
|c Wendy Knox Everette.
|
246 |
3 |
0 |
|a When good design and security work together
|
264 |
|
1 |
|a [Place of publication not identified] :
|b O'Reilly Media,
|c 2020.
|
300 |
|
|
|a 1 online resource (1 streaming video file (42 min., 33 sec.)) :
|b digital, sound, color
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
337 |
|
|
|a video
|b v
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
500 |
|
|
|a Title from resource description page (viewed May 20, 2020).
|
511 |
0 |
|
|a Presenter, Wendy Knox Everette.
|
520 |
|
|
|a "Security concerns are often dealt with as an afterthought—the focus is on building a product, and then security features or compensating controls are thrown in after the product is nearly ready to launch. Why do so many development teams take this approach? For one, they may not have an application security team to advise them. Or the security team may be seen as a roadblock, insisting on things that make the product less user friendly, or in tension with performance goals or other business demands. But security doesn’t need to be a bolt-on in your software process; good design principles should go hand in hand with a strong security stance. What does your engineering team need to know to begin designing safer, more robust software from the get-go? Drawing on experience working in application security with companies of various sizes and maturity levels, Wendy Knox Everette (Leviathan Security) focuses on several core principles and provides some resources for you to do more of a deep dive into various topics."--Resource description page.
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Software engineering.
|
650 |
|
0 |
|a Computer software
|x Development
|x Security measures.
|
650 |
|
0 |
|a Engineering systems
|x Security measures.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Génie logiciel.
|
650 |
|
6 |
|a Systèmes d'ingénierie
|x Sécurité
|x Mesures.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
650 |
|
7 |
|a Software engineering.
|2 fast
|0 (OCoLC)fst01124185
|
711 |
2 |
|
|a O'Reilly Software Architecture Conference
|d (2019 :
|c San Jose, California)
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/0636920342960/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|