Amazon cover image
Image from Amazon.com

Practical Core Software Security : A Reference Framework / James F. Ransome, Anmol Misra, Mark S. Merkow.

By: Contributor(s): Material type: TextTextPublisher: Boca Raton, FL : Auerbach Publications, 2023Edition: First editionDescription: 262 pages : illustrations ; 24 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781032276038
Subject(s): DDC classification:
  • 23 005.8  R.J.P
Contents:
1. Introduction ; 2. The Security Development Lifecycle ; 3. Security Assessment (A1): SDL Activities and Best Practices ; 4. Architecture (A2): SDL Activities and Best Practices ; 5. Design and Development (A3): SDL Activities and Best Practices ; 6. Design and Development (A4): SDL Activities and Best Practices ; 7. Ship (A5): SDL Activities and Best Practices ; 8. Post-Release Support (PRSA1–5) ; 9. Adapting Our Reference Framework to Your Environment ; A. Case Study for Chapters 3 Through 8 Exercises ; B. Answers to Quick-Check Questions.
Summary: This book outlines a step-by-step process for software security, emphasizing the human element in managing a secure software development process. It presents best practices and metrics to minimize vulnerabilities before software deployment.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Call number Status Date due Barcode Item holds
Books Books Media and mass communication Library B3 005.8 R.J.P Available MA0002632
Total holds: 0

Includes bibliographical references and index.

1. Introduction ; 2. The Security Development Lifecycle ; 3. Security Assessment (A1): SDL Activities and Best Practices ; 4. Architecture (A2): SDL Activities and Best Practices ; 5. Design and Development (A3): SDL Activities and Best Practices ; 6. Design and Development (A4): SDL Activities and Best Practices ; 7. Ship (A5): SDL Activities and Best Practices ; 8. Post-Release Support (PRSA1–5) ; 9. Adapting Our Reference Framework to Your Environment ; A. Case Study for Chapters 3 Through 8 Exercises ; B. Answers to Quick-Check Questions.

This book outlines a step-by-step process for software security, emphasizing the human element in managing a secure software development process. It presents best practices and metrics to minimize vulnerabilities before software deployment.

There are no comments on this title.

to post a comment.