My Account Log in

2 options

Core software security : security at the source / James Ransome and Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt.

Ebook Central Academic Complete Available online

View online

O'Reilly Online Learning: Academic/Public Library Edition Available online

View online
Format:
Book
Author/Creator:
Ransome, James F., author.
Contributor:
Schoenfield, Brook S. E., contributor.
Series:
Gale eBooks
Language:
English
Subjects (All):
Computer security.
Physical Description:
1 online resource (xxvi, 388 pages) : illustrations
Edition:
1st edition
Place of Publication:
Boca Raton : CRC Press, Taylor & Francis Group, [2014]
Language Note:
English
System Details:
text file
Summary:
This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip-- Provided by publisher.
Contents:
Front Cover; Dedication; Contents; Foreword; Preface; Acknowledgments; About the Authors; Chapter 1 - Introduction; Chapter 2 - The Secure Development Lifecycle; Chapter 3 - Security Assessment (A1): SDL Activities and Best Practices; Chapter 4 - Architecture (A2): SDL Activities and Best Practices; Chapter 5 - Design and Development (A3): SDL Activities and Best Practices; Chapter 6 - Design and Development (A4): SDL Activities and Best Practices; Chapter 7 - Ship (A5): SDL Activities and Best Practices; Chapter 8 - Post-Release Support (PRSA1-5)
Chapter 9 - Applying the SDL Framework to the Real WorldChapter 10 - Pulling It All Together: Using the SDL to Prevent Real-World Threats; Appendix - Key Success Factors, Deliverables, and Metrics for Each Phase of Our SDL Model; Back Cover
Notes:
Description based upon print version of record.
Includes bibliographical references.
Description based on print version record.
ISBN:
9780429623646
042962364X
9780429054303
0429054300
9781466560963
1466560967
OCLC:
869311301

The Penn Libraries is committed to describing library materials using current, accurate, and responsible language. If you discover outdated or inaccurate language, please fill out this feedback form to report it and suggest alternative language.

My Account

Shelf Request an item Bookmarks Fines and fees Settings

Guides

Using the Library Catalog Using Articles+ Library Account