Core software security : security at the source

"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and...

Full description

Saved in:
Bibliographic Details
Main Authors: Ransome, James F. (Author), Misra, Anmol (Author), Schoenfield, Brook (Author)
Format: Book
Language: English
Published: Boca Raton : CRC Press, c2014
Subjects:
ISBN: 9781466560956
Physical Description: xxvi, 388 s. : il. ; 24 cm

Cover

Table of contents

LEADER 02591cam a2200373 a 4500
001 70958
003 CZ ZlUTB
005 20240829153004.0
007 ta
008 131023s2014 xxua f f 001 0 eng
020 |a 9781466560956  |q (váz.) 
040 |a DLC  |b cze  |c DLC  |d DLC  |d ZLD002 
072 7 |a 004  |x Počítačová věda. Výpočetní technika. Informační technologie  |2 Konspekt  |9 23 
080 |a 004.056  |2 MRF 
080 |a 004.4.056.5  |2 MRF 
080 |a (035)  |2 MRF 
100 1 |a Ransome, James F.  |7 utb2014814902  |4 aut 
245 1 0 |a Core software security :  |b security at the source /  |c James Ransome and Anmol Misra ; contributing author Brook Schoenfield ; foreword by Howard Schmidt 
260 |a Boca Raton :  |b CRC Press,  |c c2014 
300 |a xxvi, 388 s. :  |b il. ;  |c 24 cm 
520 |a "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--Vydavatelská anotace 
504 |a Obsahuje bibliografie a rejstřík 
650 0 7 |a počítačová bezpečnost  |7 ph165952  |2 czenas 
650 0 7 |a ochrana softwaru  |7 ph165950  |2 czenas 
650 0 9 |a computer security  |2 eczenas 
650 0 9 |a software protection  |2 eczenas 
655 7 |a příručky  |7 fd133209  |2 czenas 
655 9 |a handbooks, manuals, etc  |2 eczenas 
700 1 |a Misra, Anmol  |7 ntk2013773827  |4 aut 
700 1 |a Schoenfield, Brook  |7 utb2014814916  |4 aut 
910 |a ZLD002 
992 |a BK  |b SK 
999 |c 70958  |d 70958 
952 |0 0  |1 0  |4 0  |6 004RANSOMEJ  |7 0  |8 BOOK  |9 127444  |a UTBZL  |b UTBZL  |c 005  |d 2014-04-09  |o 004/RANSOME,J.  |p 420010153726  |r 2019-08-26  |v 2050.00  |w 2019-08-26  |x N:nákup;  |y 01