Library Hours
Monday to Friday: 9 a.m. to 9 p.m.
Saturday: 9 a.m. to 5 p.m.
Sunday: 1 p.m. to 9 p.m.
Naper Blvd. 1 p.m. to 5 p.m.
     
Limit search to available items
Results Page:  Previous Next
Author Ransome, James F., author.

Title Core software security : security at the source / James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt. [O'Reilly electronic resource]

Publication Info. Boca Raton : CRC Press, Taylor & Francis Group, [2014]
©2014
QR Code
Description 1 online resource (xxvi, 388 pages) : illustrations
Summary "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- Provided by publisher
Bibliography Includes bibliographical references and index.
Contents The secure development lifecycle -- Security assessment (A1): SDL activities and best practices -- Architecture (A2): SDL activities and best practices -- Design and development (A3): SDL activities and best practices -- Design and development (A4): SDL activities and best practices -- Ship (A5): SDL activities and best practices -- Post-release support (PRSA1-5) -- Applying the SDL framework to the real world -- Pulling it all together: using the SDL to prevent real-world threats.
Subject Computer security.
Sécurité informatique.
Computer security
Added Author Misra, Anmol, author.
Schoenfield, Brook S. E., author.
Schmidt, Howard A., writer of foreword.
Other Form: Print version: Ransome, James F. Core software security. Boca Raton : Taylor & Francis, 2014 9781466560956 (DLC) 2013042460 (OCoLC)785869281
ISBN 9781466560963 (eBook - PDF)
1466560967 (eBook - PDF)
(hardback)
(hardback)
Patron reviews: add a review
Click for more information
EBOOK
No one has rated this material

You can...
Also...
- Find similar reads
- Add a review
- Sign-up for Newsletter
- Suggest a purchase
- Can't find what you want?
More Information