Core software security: security at the source
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton
Taylor & Francis
[2014]
|
Schlagworte: | |
Beschreibung: | Includes bibliographical references "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- |
Beschreibung: | 1 Online-Ressource (387 pages) |
ISBN: | 9781466560956 9781466560963 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV041770142 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 140401s2014 |||| o||u| ||||||eng d | ||
020 | |a 9781466560956 |c Print |9 978-1-4665-6095-6 | ||
020 | |a 9781466560963 |c Online |9 978-1-4665-6096-3 | ||
035 | |a (OCoLC)869311301 | ||
035 | |a (DE-599)BVBBV041770142 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
082 | 0 | |a 005.8 |2 23 | |
100 | 1 | |a Ransome, James |e Verfasser |4 aut | |
245 | 1 | 0 | |a Core software security |b security at the source |c James Ransome, Anmol Misra ; contributing author (chapter 9), Brook Schoenfield ; foreword by Howard Schmidt |
264 | 1 | |a Boca Raton |b Taylor & Francis |c [2014] | |
300 | |a 1 Online-Ressource (387 pages) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
500 | |a "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- | ||
650 | 4 | |a Computer security | |
653 | |a Electronic books | ||
700 | 1 | |a Schoenfield, Brook |e Sonstige |4 oth | |
700 | 1 | |a Misra, Anmol |e Sonstige |4 oth | |
912 | |a ZDB-38-EBR | ||
999 | |a oai:aleph.bib-bvb.de:BVB01-027216166 |
Datensatz im Suchindex
_version_ | 1804152078048690176 |
---|---|
any_adam_object | |
author | Ransome, James |
author_facet | Ransome, James |
author_role | aut |
author_sort | Ransome, James |
author_variant | j r jr |
building | Verbundindex |
bvnumber | BV041770142 |
collection | ZDB-38-EBR |
ctrlnum | (OCoLC)869311301 (DE-599)BVBBV041770142 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02277nmm a2200349zc 4500</leader><controlfield tag="001">BV041770142</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">140401s2014 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466560956</subfield><subfield code="c">Print</subfield><subfield code="9">978-1-4665-6095-6</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466560963</subfield><subfield code="c">Online</subfield><subfield code="9">978-1-4665-6096-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)869311301</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV041770142</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ransome, James</subfield><subfield code="e">Verfasser</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Core software security</subfield><subfield code="b">security at the source</subfield><subfield code="c">James Ransome, Anmol Misra ; contributing author (chapter 9), Brook Schoenfield ; foreword by Howard Schmidt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">Taylor & Francis</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (387 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="653" ind1=" " ind2=" "><subfield code="a">Electronic books</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schoenfield, Brook</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Misra, Anmol</subfield><subfield code="e">Sonstige</subfield><subfield code="4">oth</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-38-EBR</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027216166</subfield></datafield></record></collection> |
id | DE-604.BV041770142 |
illustrated | Not Illustrated |
indexdate | 2024-07-10T01:04:59Z |
institution | BVB |
isbn | 9781466560956 9781466560963 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027216166 |
oclc_num | 869311301 |
open_access_boolean | |
physical | 1 Online-Ressource (387 pages) |
psigel | ZDB-38-EBR |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | Taylor & Francis |
record_format | marc |
spelling | Ransome, James Verfasser aut Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9), Brook Schoenfield ; foreword by Howard Schmidt Boca Raton Taylor & Francis [2014] 1 Online-Ressource (387 pages) txt rdacontent c rdamedia cr rdacarrier Includes bibliographical references "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- Computer security Electronic books Schoenfield, Brook Sonstige oth Misra, Anmol Sonstige oth |
spellingShingle | Ransome, James Core software security security at the source Computer security |
title | Core software security security at the source |
title_auth | Core software security security at the source |
title_exact_search | Core software security security at the source |
title_full | Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9), Brook Schoenfield ; foreword by Howard Schmidt |
title_fullStr | Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9), Brook Schoenfield ; foreword by Howard Schmidt |
title_full_unstemmed | Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9), Brook Schoenfield ; foreword by Howard Schmidt |
title_short | Core software security |
title_sort | core software security security at the source |
title_sub | security at the source |
topic | Computer security |
topic_facet | Computer security |
work_keys_str_mv | AT ransomejames coresoftwaresecuritysecurityatthesource AT schoenfieldbrook coresoftwaresecuritysecurityatthesource AT misraanmol coresoftwaresecuritysecurityatthesource |