| 000 | 01978nam a22003377i 4500 | ||
|---|---|---|---|
| 005 | 20250820124436.0 | ||
| 008 | 250804s2024 flua|||fr|||| 001 0 eng d | ||
| 020 | _a9781032276038 | ||
| 040 |
_aEG-GaU _cEG-GaU _dEG-GaU _erda |
||
| 082 | 0 | 4 |
_223 _a005.8 _bR.J.P |
| 100 | 1 |
_aRansome, James F., _eauthor. _961076 |
|
| 245 | 1 | 0 |
_aPractical Core Software Security : _bA Reference Framework / _cJames F. Ransome, Anmol Misra, Mark S. Merkow. |
| 250 | _aFirst edition. | ||
| 264 | 1 |
_aBoca Raton, FL : _bAuerbach Publications, _c2023. |
|
| 300 |
_a262 pages : _billustrations ; _c24 cm. |
||
| 336 |
_2rdacontent _atext _btxt |
||
| 337 |
_2rdamedia _aunmediated _bn |
||
| 338 |
_2rdacarrier _avolume _bnc |
||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | _a1. Introduction ; 2. The Security Development Lifecycle ; 3. Security Assessment (A1): SDL Activities and Best Practices ; 4. Architecture (A2): SDL Activities and Best Practices ; 5. Design and Development (A3): SDL Activities and Best Practices ; 6. Design and Development (A4): SDL Activities and Best Practices ; 7. Ship (A5): SDL Activities and Best Practices ; 8. Post-Release Support (PRSA1–5) ; 9. Adapting Our Reference Framework to Your Environment ; A. Case Study for Chapters 3 Through 8 Exercises ; B. Answers to Quick-Check Questions. | ||
| 520 | _aThis book outlines a step-by-step process for software security, emphasizing the human element in managing a secure software development process. It presents best practices and metrics to minimize vulnerabilities before software deployment. | ||
| 650 | 0 |
_aSoftware security. _961077 |
|
| 650 | 0 |
_aSecure software development lifecycle. _961078 |
|
| 650 | 0 |
_aCybersecurity. _961079 |
|
| 650 | 0 | _aSoftware engineering. | |
| 650 | 0 | _aComputer security. | |
| 700 | 1 |
_aMisra, Anmol, _eauthor. _961080 |
|
| 700 | 1 |
_aMerkow, Mark S., _eauthor. _961081 |
|
| 942 |
_2ddc _cBK |
||
| 999 |
_c11353 _d11353 |
||