Cargando…

Security engineering 101 : when good design and security work together /

"Security concerns are often dealt with as an afterthought—the focus is on building a product, and then security features or compensating controls are thrown in after the product is nearly ready to launch. Why do so many development teams take this approach? For one, they may not have an applic...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor Corporativo: O'Reilly Software Architecture Conference
Formato: Electrónico Congresos, conferencias Video
Idioma:Inglés
Publicado: [Place of publication not identified] : O'Reilly Media, 2020.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a2200000Ii 4500
001 OR_on1155111688
003 OCoLC
005 20231017213018.0
006 m o c
007 cr cna||||||||
007 vz czazuu
008 200521s2020 xx 043 o vleng d
040 |a UMI  |b eng  |e rda  |e pn  |c UMI  |d OCLCF  |d OCLCO 
035 |a (OCoLC)1155111688 
037 |a CL0501000112  |b Safari Books Online 
050 4 |a QA76.9.A25 
049 |a UAMI 
100 1 |a Everette, Wendy Knox,  |e on-screen presenter. 
245 1 0 |a Security engineering 101 :  |b when good design and security work together /  |c Wendy Knox Everette. 
246 3 0 |a When good design and security work together 
264 1 |a [Place of publication not identified] :  |b O'Reilly Media,  |c 2020. 
300 |a 1 online resource (1 streaming video file (42 min., 33 sec.)) :  |b digital, sound, color 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
337 |a video  |b v  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a Title from resource description page (viewed May 20, 2020). 
511 0 |a Presenter, Wendy Knox Everette. 
520 |a "Security concerns are often dealt with as an afterthought—the focus is on building a product, and then security features or compensating controls are thrown in after the product is nearly ready to launch. Why do so many development teams take this approach? For one, they may not have an application security team to advise them. Or the security team may be seen as a roadblock, insisting on things that make the product less user friendly, or in tension with performance goals or other business demands. But security doesn’t need to be a bolt-on in your software process; good design principles should go hand in hand with a strong security stance. What does your engineering team need to know to begin designing safer, more robust software from the get-go? Drawing on experience working in application security with companies of various sizes and maturity levels, Wendy Knox Everette (Leviathan Security) focuses on several core principles and provides some resources for you to do more of a deep dive into various topics."--Resource description page. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Software engineering. 
650 0 |a Computer software  |x Development  |x Security measures. 
650 0 |a Engineering systems  |x Security measures. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Génie logiciel. 
650 6 |a Systèmes d'ingénierie  |x Sécurité  |x Mesures. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484 
650 7 |a Software engineering.  |2 fast  |0 (OCoLC)fst01124185 
711 2 |a O'Reilly Software Architecture Conference  |d (2019 :  |c San Jose, California) 
856 4 0 |u https://learning.oreilly.com/videos/~/0636920342960/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP