Cargando…

Application security : a complete guide.

Every company uses software to function. From Fortune 500 technology companies to sole-proprietor landscaping firms, software is integral to businesses large and small. The right software, properly secured, can help organizations to move quickly and stay ahead of their competition. Business software...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Formato: Electrónico Video
Idioma:Inglés
Publicado: [Place of publication not identified] : Manning Publications, [2023]
Edición:[First edition].
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cgm a22000007i 4500
001 OR_on1378794583
003 OCoLC
005 20231017213018.0
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230511s2023 xx 370 o vleng d
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA  |d OCLCF  |d OCLCO 
019 |a 1390765653 
024 8 |a 10000DIVC202320 
029 1 |a AU@  |b 000074864247 
035 |a (OCoLC)1378794583  |z (OCoLC)1390765653 
037 |a 10000DIVC202320  |b O'Reilly Media 
050 4 |a QA76.76.A65 
082 0 4 |a 005.3  |2 23/eng/20230511 
049 |a UAMI 
245 0 0 |a Application security :  |b a complete guide. 
250 |a [First edition]. 
264 1 |a [Place of publication not identified] :  |b Manning Publications,  |c [2023] 
300 |a 1 online resource (1 video file (6 hr., 10 min.)) :  |b sound, color. 
306 |a 061000 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Derek Fisher, presenter. 
520 |a Every company uses software to function. From Fortune 500 technology companies to sole-proprietor landscaping firms, software is integral to businesses large and small. The right software, properly secured, can help organizations to move quickly and stay ahead of their competition. Business software provides a means to track employees, customers, inventory, and scheduling. Data moves from a myriad of systems, networks, and software applications, providing insights to businesses looking to stay competitive. Depending on the needs and resources of a company, it may develop and build its own software, or it may purchase ready-made software and integrate it into the business operations. What this means is that every organization, regardless of size and industry, has a software need. That is why there is an urgent need for people to develop and implement secure software. That's where this course comes in: it is designed to help you become one of those crucial people. This course will familiarize you with the common vulnerabilities that plague developed code, as outlined by the publications that set the industry standards, such as the OWASP Top 10 list of critical risks and the SANS Top 25 list of most dangerous flaws in software. You will understand what type of development behaviors lead to vulnerabilities and how to avoid those behaviors when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. You will also learn to review and operate developer analysis tools to discover vulnerabilities, allowing you to correct them early in the development life cycle. Finally, you will understand how application security fits in an overall cyber security program. 
588 |a Online resource; title from title details screen (O'Reilly, viewed May 11, 2023). 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Application software  |x Security measures. 
650 0 |a Computer security. 
650 6 |a Logiciels d'application  |x Sécurité  |x Mesures. 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
655 7 |a Instructional films  |2 fast 
655 7 |a Internet videos  |2 fast 
655 7 |a Nonfiction films  |2 fast 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
655 7 |a Films de formation.  |2 rvmgf 
655 7 |a Films autres que de fiction.  |2 rvmgf 
655 7 |a Vidéos sur Internet.  |2 rvmgf 
700 1 |a Fisher, Derek,  |e presenter. 
710 2 |a Manning (Firm),  |e publisher. 
856 4 0 |u https://learning.oreilly.com/videos/~/10000DIVC202320/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
994 |a 92  |b IZTAP