Core software security: security at the source
"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and...
Gespeichert in:
Beteiligte Personen: | , , |
---|---|
Weitere beteiligte Personen: | |
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Boca Raton
CRC Press, Taylor & Francis Group
[2014]
|
Schlagwörter: | |
Links: | https://learning.oreilly.com/library/view/-/9781466560963/?ar |
Zusammenfassung: | "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- |
Beschreibung: | Includes bibliographical references and index. - Print version record |
Umfang: | 1 Online-Ressource (xxvi, 388 Seiten) illustrations |
ISBN: | 9781466560963 1466560967 |
Internformat
MARC
LEADER | 00000cam a22000002 4500 | ||
---|---|---|---|
001 | ZDB-30-ORH-047598433 | ||
003 | DE-627-1 | ||
005 | 20240228115442.0 | ||
007 | cr uuu---uuuuu | ||
008 | 191023s2014 xx |||||o 00| ||eng c | ||
020 | |a 9781466560963 |c eBook - PDF |9 978-1-4665-6096-3 | ||
020 | |a 1466560967 |c eBook - PDF |9 1-4665-6096-7 | ||
035 | |a (DE-627-1)047598433 | ||
035 | |a (DE-599)KEP047598433 | ||
035 | |a (ORHE)9781466560963 | ||
035 | |a (DE-627-1)047598433 | ||
040 | |a DE-627 |b ger |c DE-627 |e rda | ||
041 | |a eng | ||
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
072 | 7 | |a COM |2 bisacsh | |
082 | 0 | |a 005.8 | |
100 | 1 | |a Ransome, James F. |e VerfasserIn |4 aut | |
245 | 1 | 0 | |a Core software security |b security at the source |c James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt |
264 | 1 | |a Boca Raton |b CRC Press, Taylor & Francis Group |c [2014] | |
264 | 4 | |c ©2014 | |
300 | |a 1 Online-Ressource (xxvi, 388 Seiten) |b illustrations | ||
336 | |a Text |b txt |2 rdacontent | ||
337 | |a Computermedien |b c |2 rdamedia | ||
338 | |a Online-Ressource |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references and index. - Print version record | ||
520 | |a "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- | ||
650 | 0 | |a Computer security | |
650 | 4 | |a Sécurité informatique | |
650 | 4 | |a COMPUTERS ; Internet ; Security | |
650 | 4 | |a COMPUTERS ; Networking ; Security | |
650 | 4 | |a COMPUTERS ; Security ; General | |
650 | 4 | |a Computer security | |
700 | 1 | |a Misra, Anmol |e VerfasserIn |4 aut | |
700 | 1 | |a Schoenfield, Brook S. E. |e VerfasserIn |4 aut | |
700 | 1 | |a Schmidt, Howard A. |e MitwirkendeR |4 ctb | |
776 | 1 | |z 9781466560956 | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 9781466560956 |
966 | 4 | 0 | |l DE-91 |p ZDB-30-ORH |q TUM_PDA_ORH |u https://learning.oreilly.com/library/view/-/9781466560963/?ar |m X:ORHE |x Aggregator |z lizenzpflichtig |3 Volltext |
912 | |a ZDB-30-ORH | ||
912 | |a ZDB-30-ORH | ||
951 | |a BO | ||
912 | |a ZDB-30-ORH | ||
049 | |a DE-91 |
Datensatz im Suchindex
DE-BY-TUM_katkey | ZDB-30-ORH-047598433 |
---|---|
_version_ | 1821494875386806272 |
adam_text | |
any_adam_object | |
author | Ransome, James F. Misra, Anmol Schoenfield, Brook S. E. |
author2 | Schmidt, Howard A. |
author2_role | ctb |
author2_variant | h a s ha has |
author_facet | Ransome, James F. Misra, Anmol Schoenfield, Brook S. E. Schmidt, Howard A. |
author_role | aut aut aut |
author_sort | Ransome, James F. |
author_variant | j f r jf jfr a m am b s e s bse bses |
building | Verbundindex |
bvnumber | localTUM |
collection | ZDB-30-ORH |
ctrlnum | (DE-627-1)047598433 (DE-599)KEP047598433 (ORHE)9781466560963 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03042cam a22005292 4500</leader><controlfield tag="001">ZDB-30-ORH-047598433</controlfield><controlfield tag="003">DE-627-1</controlfield><controlfield tag="005">20240228115442.0</controlfield><controlfield tag="007">cr uuu---uuuuu</controlfield><controlfield tag="008">191023s2014 xx |||||o 00| ||eng c</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781466560963</subfield><subfield code="c">eBook - PDF</subfield><subfield code="9">978-1-4665-6096-3</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1466560967</subfield><subfield code="c">eBook - PDF</subfield><subfield code="9">1-4665-6096-7</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598433</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)KEP047598433</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ORHE)9781466560963</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-627-1)047598433</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-627</subfield><subfield code="b">ger</subfield><subfield code="c">DE-627</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1=" " ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Ransome, James F.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Core software security</subfield><subfield code="b">security at the source</subfield><subfield code="c">James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton</subfield><subfield code="b">CRC Press, Taylor & Francis Group</subfield><subfield code="c">[2014]</subfield></datafield><datafield tag="264" ind1=" " ind2="4"><subfield code="c">©2014</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (xxvi, 388 Seiten)</subfield><subfield code="b">illustrations</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">Text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">Computermedien</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">Online-Ressource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index. - Print version record</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Sécurité informatique</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Internet ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Networking ; Security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">COMPUTERS ; Security ; General</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Misra, Anmol</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schoenfield, Brook S. E.</subfield><subfield code="e">VerfasserIn</subfield><subfield code="4">aut</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Schmidt, Howard A.</subfield><subfield code="e">MitwirkendeR</subfield><subfield code="4">ctb</subfield></datafield><datafield tag="776" ind1="1" ind2=" "><subfield code="z">9781466560956</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">9781466560956</subfield></datafield><datafield tag="966" ind1="4" ind2="0"><subfield code="l">DE-91</subfield><subfield code="p">ZDB-30-ORH</subfield><subfield code="q">TUM_PDA_ORH</subfield><subfield code="u">https://learning.oreilly.com/library/view/-/9781466560963/?ar</subfield><subfield code="m">X:ORHE</subfield><subfield code="x">Aggregator</subfield><subfield code="z">lizenzpflichtig</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="951" ind1=" " ind2=" "><subfield code="a">BO</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-30-ORH</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield></datafield></record></collection> |
id | ZDB-30-ORH-047598433 |
illustrated | Illustrated |
indexdate | 2025-01-17T11:21:20Z |
institution | BVB |
isbn | 9781466560963 1466560967 |
language | English |
open_access_boolean | |
owner | DE-91 DE-BY-TUM |
owner_facet | DE-91 DE-BY-TUM |
physical | 1 Online-Ressource (xxvi, 388 Seiten) illustrations |
psigel | ZDB-30-ORH TUM_PDA_ORH ZDB-30-ORH |
publishDate | 2014 |
publishDateSearch | 2014 |
publishDateSort | 2014 |
publisher | CRC Press, Taylor & Francis Group |
record_format | marc |
spelling | Ransome, James F. VerfasserIn aut Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt Boca Raton CRC Press, Taylor & Francis Group [2014] ©2014 1 Online-Ressource (xxvi, 388 Seiten) illustrations Text txt rdacontent Computermedien c rdamedia Online-Ressource cr rdacarrier Includes bibliographical references and index. - Print version record "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General Misra, Anmol VerfasserIn aut Schoenfield, Brook S. E. VerfasserIn aut Schmidt, Howard A. MitwirkendeR ctb 9781466560956 Erscheint auch als Druck-Ausgabe 9781466560956 |
spellingShingle | Ransome, James F. Misra, Anmol Schoenfield, Brook S. E. Core software security security at the source Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
title | Core software security security at the source |
title_auth | Core software security security at the source |
title_exact_search | Core software security security at the source |
title_full | Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt |
title_fullStr | Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt |
title_full_unstemmed | Core software security security at the source James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt |
title_short | Core software security |
title_sort | core software security security at the source |
title_sub | security at the source |
topic | Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
topic_facet | Computer security Sécurité informatique COMPUTERS ; Internet ; Security COMPUTERS ; Networking ; Security COMPUTERS ; Security ; General |
work_keys_str_mv | AT ransomejamesf coresoftwaresecuritysecurityatthesource AT misraanmol coresoftwaresecuritysecurityatthesource AT schoenfieldbrookse coresoftwaresecuritysecurityatthesource AT schmidthowarda coresoftwaresecuritysecurityatthesource |