Practical Core Software Security : (Record no. 11353)

MARC details
000 -LEADER
fixed length control field 01978nam a22003377i 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20250820124436.0
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 250804s2024 flua|||fr|||| 001 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781032276038
040 ## - CATALOGING SOURCE
Original cataloging agency EG-GaU‬‬
Transcribing agency EG-GaU‬‬
Modifying agency EG-GaU‬‬
Description conventions rda
082 04 - DEWEY DECIMAL CLASSIFICATION NUMBER
Edition number 23
Classification number 005.8
Item number R.J.P
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Ransome, James F.,
Relator term author.
9 (RLIN) 61076
245 10 - TITLE STATEMENT
Title Practical Core Software Security :
Remainder of title A Reference Framework /
Statement of responsibility, etc. James F. Ransome, Anmol Misra, Mark S. Merkow.
250 ## - EDITION STATEMENT
Edition statement First edition.
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE
Place of production, publication, distribution, manufacture Boca Raton, FL :
Name of producer, publisher, distributor, manufacturer Auerbach Publications,
Date of production, publication, distribution, manufacture, or copyright notice 2023.
300 ## - PHYSICAL DESCRIPTION
Extent 262 pages :
Other physical details illustrations ;
Dimensions 24 cm.
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term unmediated
Media type code n
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term volume
Carrier type code nc
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note 1. Introduction ; 2. The Security Development Lifecycle ; 3. Security Assessment (A1): SDL Activities and Best Practices ; 4. Architecture (A2): SDL Activities and Best Practices ; 5. Design and Development (A3): SDL Activities and Best Practices ; 6. Design and Development (A4): SDL Activities and Best Practices ; 7. Ship (A5): SDL Activities and Best Practices ; 8. Post-Release Support (PRSA1–5) ; 9. Adapting Our Reference Framework to Your Environment ; A. Case Study for Chapters 3 Through 8 Exercises ; B. Answers to Quick-Check Questions.
520 ## - SUMMARY, ETC.
Summary, etc. This book outlines a step-by-step process for software security, emphasizing the human element in managing a secure software development process. It presents best practices and metrics to minimize vulnerabilities before software deployment.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software security.
9 (RLIN) 61077
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Secure software development lifecycle.
9 (RLIN) 61078
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Cybersecurity.
9 (RLIN) 61079
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software engineering.
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Misra, Anmol,
Relator term author.
9 (RLIN) 61080
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Merkow, Mark S.,
Relator term author.
9 (RLIN) 61081
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme Dewey Decimal Classification
Koha item type Books
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Total Checkouts Full call number Barcode Date last seen Price effective from Koha item type
    Dewey Decimal Classification     Media and mass communication Library Media and mass communication Library B3 08/20/2025   005.8 R.J.P MA0002632 08/20/2025 08/20/2025 Books