|
|
|
|
LEADER |
00000cgm a22000007i 4500 |
001 |
OR_on1365103954 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o c |
007 |
vz czazuu |
007 |
cr cnannnuuuuu |
008 |
230124s2022 enk395 o vleng d |
040 |
|
|
|a ORMDA
|b eng
|e rda
|e pn
|c ORMDA
|d OCLCF
|
020 |
|
|
|a 9781837636815
|q (electronic video)
|
020 |
|
|
|a 1837636818
|q (electronic video)
|
029 |
1 |
|
|a AU@
|b 000073351705
|
035 |
|
|
|a (OCoLC)1365103954
|
037 |
|
|
|a 9781837636815
|b O'Reilly Media
|
050 |
|
4 |
|a QA76.76.A65
|
082 |
0 |
4 |
|a 005.3
|2 23/eng/20230124
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Fundamentals of secure software /
|c Derek Fisher.
|
250 |
|
|
|a [First edition].
|
264 |
|
1 |
|a [Birmingham, England] :
|b Packt Publishing Ltd.,
|c [2022]
|
300 |
|
|
|a 1 online resource (1 video file (6 hr., 35 min.)) :
|b sound, color.
|
306 |
|
|
|a 063500
|
336 |
|
|
|a two-dimensional moving image
|b tdi
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
344 |
|
|
|a digital
|2 rdatr
|
347 |
|
|
|a video file
|2 rdaft
|
380 |
|
|
|a Instructional films
|2 lcgft
|
511 |
0 |
|
|a Derek Fisher, presenter.
|
520 |
|
|
|a Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. It may include hardware, software, and procedures that identify or minimize security vulnerabilities. Web application security is the process of securing websites, web applications, and other internet-based services from cyber-attacks, breaches, and security threats that leverage loopholes, misconfigurations, and vulnerabilities in these applications or their codes. This course will familiarize you with the common vulnerabilities that plague developed code as outlined in publications such as the OWASP Top 10 and SANS Top 25. You will understand what type of development behaviors lead to vulnerabilities and how to avoid those behaviors when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. You will also review and operate analysis tools that are available to developers in order to analyze their code and discover vulnerabilities, allowing you to correct them early in the development lifecycle. Finally, you will understand how application security fits in an overall cybersecurity program. By the end of this course, you will have learned the basic fundamentals, best practices and tools to be used for application security.
|
588 |
0 |
|
|a Online resource; title from title details screen (O’Reilly, viewed January 24, 2023).
|
590 |
|
|
|a O'Reilly
|b O'Reilly Online Learning: Academic/Public Library Edition
|
650 |
|
0 |
|a Application software
|x Security measures.
|
650 |
|
0 |
|a Computer security.
|
650 |
|
7 |
|a Computer security.
|2 fast
|0 (OCoLC)fst00872484
|
655 |
|
7 |
|a Instructional films.
|2 fast
|0 (OCoLC)fst01726236
|
655 |
|
7 |
|a Internet videos.
|2 fast
|0 (OCoLC)fst01750214
|
655 |
|
7 |
|a Nonfiction films.
|2 fast
|0 (OCoLC)fst01710269
|
655 |
|
7 |
|a Instructional films.
|2 lcgft
|
655 |
|
7 |
|a Nonfiction films.
|2 lcgft
|
655 |
|
7 |
|a Internet videos.
|2 lcgft
|
700 |
1 |
|
|a Fisher, Derek,
|e presenter.
|
710 |
2 |
|
|a Packt Publishing,
|e publisher.
|
856 |
4 |
0 |
|u https://learning.oreilly.com/videos/~/9781837636815/?ar
|z Texto completo (Requiere registro previo con correo institucional)
|
994 |
|
|
|a 92
|b IZTAP
|