James F. Ransome, Anmol Misra, Mark S. Merkow
Practical Core Software Security (eBook, ePUB)
A Reference Framework
78,95 €
78,95 €
inkl. MwSt.
Sofort per Download lieferbar
39 °P sammeln
78,95 €
Als Download kaufen
78,95 €
inkl. MwSt.
Sofort per Download lieferbar
39 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
78,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
39 °P sammeln
James F. Ransome, Anmol Misra, Mark S. Merkow
Practical Core Software Security (eBook, ePUB)
A Reference Framework
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This textbook explains developer-centric software security, a holistic process to engage security. As long as software is developed by humans, it requires the human element to fix it. It outlines a step-by-step process for software security that is focused on educating graduate and undergraduate students.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 19.58MB
Andere Kunden interessierten sich auch für
- James F. RansomePractical Core Software Security (eBook, PDF)79,95 €
- Bradley FowlerCybersecurity Public Policy (eBook, ePUB)61,95 €
- Shivi GargMobile OS Vulnerabilities (eBook, ePUB)52,95 €
- Tara KissoonOptimal Spending on Cybersecurity Measures (eBook, ePUB)46,95 €
- Steve KingLosing the Cybersecurity War (eBook, ePUB)31,95 €
- IoT and AI Technologies for Sustainable Living (eBook, ePUB)47,95 €
- Michael MeloneDesigning Secure Systems (eBook, ePUB)47,95 €
-
-
-
This textbook explains developer-centric software security, a holistic process to engage security. As long as software is developed by humans, it requires the human element to fix it. It outlines a step-by-step process for software security that is focused on educating graduate and undergraduate students.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 286
- Erscheinungstermin: 2. August 2022
- Englisch
- ISBN-13: 9781000725810
- Artikelnr.: 64124814
- Verlag: Taylor & Francis
- Seitenzahl: 286
- Erscheinungstermin: 2. August 2022
- Englisch
- ISBN-13: 9781000725810
- Artikelnr.: 64124814
James Ransome, PhD, CISSP, CISM is the Chief Scientist for CYBERPHOS, an early-stage cybersecurity startup. He is also a member of the board of directors for the Bay Area Chief Security Officer Council. Most recently, James was the Senior Director of Security Development Lifecycle Engineering for Intel's Product Assurance and Security (IPAS). In that capacity, he led a team of SDL engineers, architects, and product security experts to drive and implement security practices across the company. Prior to that, James was the Senior Director of Product Security and PSIRT at Intel Security (formerly McAfee).
Anmol Misra is an accomplished leader, researcher, author, and security expert, with over 16 years of experience in technology and cybersecurity. His engineering, security, and consulting background makes him uniquely suited to drive the adoption of disruptive technologies. He is a team builder focused on mentoring and nurturing high-potential leaders, fostering excellence, and building industry partnerships. He is known for his pragmatic approach to security.
Mark S. Merkow, CISSP, CISM, CSSLP has over 25 years of experience in corporate information security and 17 years in the AppSec space helping to establish and lead application security initiatives to success and sustainment. Mark is a faculty member at the University of Denver, where he works developing and instructing online courses in topics across the Information Security spectrum, with a focus on secure software development. He also works as an advisor to the University of Denver's Information and Computing Technology Curriculum Team for new course development and changes to the curriculum and for Strayer University as an advisor to the undergraduate and graduate programs in information security.
Anmol Misra is an accomplished leader, researcher, author, and security expert, with over 16 years of experience in technology and cybersecurity. His engineering, security, and consulting background makes him uniquely suited to drive the adoption of disruptive technologies. He is a team builder focused on mentoring and nurturing high-potential leaders, fostering excellence, and building industry partnerships. He is known for his pragmatic approach to security.
Mark S. Merkow, CISSP, CISM, CSSLP has over 25 years of experience in corporate information security and 17 years in the AppSec space helping to establish and lead application security initiatives to success and sustainment. Mark is a faculty member at the University of Denver, where he works developing and instructing online courses in topics across the Information Security spectrum, with a focus on secure software development. He also works as an advisor to the University of Denver's Information and Computing Technology Curriculum Team for new course development and changes to the curriculum and for Strayer University as an advisor to the undergraduate and graduate programs in information security.
1. Introduction 2. The Security Development Lifecycle 3. Security
Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2):
SDL Activities and Best Practices 5. Design and Development (A3): SDL
Activities and Best Practices 6. Design and Development (A4): SDL
Activities and Best Practices 7. Ship (A5): SDL Activities and Best
Practices 8. Post-Release Support (PRSA1¿5) 9. Adapting Our Reference
Framework to Your Environment A. Case Study for Chapters 3 Through 8
Exercises B. Answers to Quick-Check Questions
Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2):
SDL Activities and Best Practices 5. Design and Development (A3): SDL
Activities and Best Practices 6. Design and Development (A4): SDL
Activities and Best Practices 7. Ship (A5): SDL Activities and Best
Practices 8. Post-Release Support (PRSA1¿5) 9. Adapting Our Reference
Framework to Your Environment A. Case Study for Chapters 3 Through 8
Exercises B. Answers to Quick-Check Questions
1. Introduction 2. The Security Development Lifecycle 3. Security Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2): SDL Activities and Best Practices 5. Design and Development (A3): SDL Activities and Best Practices 6. Design and Development (A4): SDL Activities and Best Practices 7. Ship (A5): SDL Activities and Best Practices 8. Post-Release Support (PRSA1-5) 9. Adapting Our Reference Framework to Your Environment A. Case Study for Chapters 3 Through 8 Exercises B. Answers to Quick-Check Questions
1. Introduction 2. The Security Development Lifecycle 3. Security
Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2):
SDL Activities and Best Practices 5. Design and Development (A3): SDL
Activities and Best Practices 6. Design and Development (A4): SDL
Activities and Best Practices 7. Ship (A5): SDL Activities and Best
Practices 8. Post-Release Support (PRSA1¿5) 9. Adapting Our Reference
Framework to Your Environment A. Case Study for Chapters 3 Through 8
Exercises B. Answers to Quick-Check Questions
Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2):
SDL Activities and Best Practices 5. Design and Development (A3): SDL
Activities and Best Practices 6. Design and Development (A4): SDL
Activities and Best Practices 7. Ship (A5): SDL Activities and Best
Practices 8. Post-Release Support (PRSA1¿5) 9. Adapting Our Reference
Framework to Your Environment A. Case Study for Chapters 3 Through 8
Exercises B. Answers to Quick-Check Questions
1. Introduction 2. The Security Development Lifecycle 3. Security Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2): SDL Activities and Best Practices 5. Design and Development (A3): SDL Activities and Best Practices 6. Design and Development (A4): SDL Activities and Best Practices 7. Ship (A5): SDL Activities and Best Practices 8. Post-Release Support (PRSA1-5) 9. Adapting Our Reference Framework to Your Environment A. Case Study for Chapters 3 Through 8 Exercises B. Answers to Quick-Check Questions