Cargando…

Software security engineering : a guide for project managers /

"This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phase...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Allen, Julia H.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Upper Saddle River, N.J. : Addison-Wesley, 2008.
Colección:SEI series in software engineering.
Addison-Wesley software security series.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn226860667
003 OCoLC
005 20231017213018.0
006 m o d
007 cr unu||||||||
008 080501s2008 njua ob 001 0 eng d
040 |a UMI  |b eng  |e pn  |c UMI  |d OCLCQ  |d TXJ  |d CEF  |d OCLCQ  |d DEBSZ  |d C6I  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d IDEBK  |d OCLCQ  |d OCLCO  |d OCLCQ  |d YDX  |d OCLCA  |d AU@  |d OCLCO  |d UAB  |d OCLCO  |d OCLCQ  |d CNCEN  |d UKAHL  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 666899255  |a 1044282345  |a 1056346388  |a 1060806480  |a 1100906787 
020 |a 9780321559685 
020 |a 0321559681 
020 |z 032150917X 
020 |z 9780321509178 
024 8 |a 9780321559685 
029 1 |a CHBIS  |b 006148928 
029 1 |a CHVBK  |b 171262646 
029 1 |a DEBSZ  |b 355405849 
029 1 |a HEBIS  |b 291478573 
035 |a (OCoLC)226860667  |z (OCoLC)666899255  |z (OCoLC)1044282345  |z (OCoLC)1056346388  |z (OCoLC)1060806480  |z (OCoLC)1100906787 
037 |a CL0500000021  |b Safari Books Online 
050 4 |a QA76.9.A25  |b S654 2008 
082 0 4 |a 005.8  |2 22 
084 |a QP 360  |2 rvk 
049 |a UAMI 
245 0 0 |a Software security engineering :  |b a guide for project managers /  |c Julia H. Allen [and others]. 
260 |a Upper Saddle River, N.J. :  |b Addison-Wesley,  |c 2008. 
300 |a 1 online resource (xxvi, 315 pages) :  |b illustrations 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file 
490 1 |a The SEI series in software engineering 
490 1 |a The Addison-Wesley software security series 
504 |a Includes bibliographical references and index. 
505 0 |a Sei series in software engineering. 
588 0 |a Print version record. 
520 |a "This book's broad overview can help an organization choose a set of processes, policies, and techniques that are appropriate for its security maturity, risk tolerance, and development style. This book will help you understand how to incorporate practical security techniques into all phases of the development lifecycle."--Steve Riley, senior security strategist, Microsoft Corporation "There are books written on some of the topics addressed in this book, and there are other books on secure systems engineering. Few address the entire life cycle with a comprehensive overview and discussion of emerging trends and topics as well as this one."--Ronda Henning, senior scientist-software/security queen, Harris Corporation Software that is developed from the beginning with security in mind will resist, tolerate, and recover from attacks more effectively than would otherwise be possible. While there may be no silver bullet for security, there are practices that project managers will find beneficial. With this management guide, you can select from a number of sound practices likely to increase the security and dependability of your software, both during its development and subsequently in its operation. Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book's expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security. This book will help you understand why Software security is about more than just eliminating vulnerabilities and conducting penetration tests Network security mechanisms and IT infrastructure security services do not sufficiently protect application software from security risks Software security initiatives should follow a risk-management approach to identify priorities and to define what is "good enough"-understanding that software security risks will change throughout the SDLC Project managers and software engineers need to learn to think like an attacker in order to address the range of function ... 
542 |f Copyright © 2008 Pearson Education, Incorporated  |g 2008 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 0 |a Software engineering. 
650 0 |a Computer networks  |x Security measures. 
650 6 |a Sécurité informatique. 
650 6 |a Génie logiciel. 
650 6 |a Réseaux d'ordinateurs  |x Sécurité  |x Mesures. 
650 7 |a Computer security.  |2 blmlsh 
650 7 |a Software engineering.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures.  |2 blmlsh 
650 7 |a Computer networks  |x Security measures  |2 fast 
650 7 |a Computer security  |2 fast 
650 7 |a Software engineering  |2 fast 
650 7 |a Computersicherheit  |2 gnd 
650 7 |a Software Engineering  |2 gnd 
700 1 |a Allen, Julia H. 
776 0 8 |i Print version:  |t Software security engineering.  |d Upper Saddle River, N.J. : Addison-Wesley, 2008  |z 032150917X 
776 0 8 |i Print version:  |t Software security engineering.  |d Upper Saddle River, N.J. : Addison-Wesley, 2008  |z 9780321509178 
830 0 |a SEI series in software engineering. 
830 0 |a Addison-Wesley software security series. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780321559685/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37826630 
938 |a Askews and Holts Library Services  |b ASKH  |n AH37823767 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n 264871 
938 |a YBP Library Services  |b YANK  |n 14858142 
994 |a 92  |b IZTAP