Mark S. Merkow
Practical Security for Agile and DevOps (eBook, ePUB)
62,95 €
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
62,95 €
Als Download kaufen
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
31 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
62,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
31 °P sammeln
Mark S. Merkow
Practical Security for Agile and DevOps (eBook, ePUB)
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
This text offers college students in Information Security Programs an accessible and practical guide on securing software development practices, regardless of which development methodology is used. It is written with a contemporary view on securing all types of software development practices or methodologies.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 15.14MB
Andere Kunden interessierten sich auch für
- Mark S. MerkowPractical Security for Agile and DevOps (eBook, PDF)62,95 €
- Brook S. E. SchoenfieldSecuring Systems (eBook, ePUB)49,95 €
- David B. SkillicornCybersecurity for Everyone (eBook, ePUB)21,95 €
- Artificial Intelligence for Intrusion Detection Systems (eBook, ePUB)52,95 €
- Mano PaulOfficial (ISC)2 Guide to the CSSLP (eBook, ePUB)52,95 €
- Recent Advances in Security, Privacy, and Trust for Internet of Things (IoT) and Cyber-Physical Systems (CPS) (eBook, ePUB)51,95 €
- Michael K. LevineA Tale of Two Systems (eBook, ePUB)44,95 €
-
-
-
This text offers college students in Information Security Programs an accessible and practical guide on securing software development practices, regardless of which development methodology is used. It is written with a contemporary view on securing all types of software development practices or methodologies.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 236
- Erscheinungstermin: 13. Februar 2022
- Englisch
- ISBN-13: 9781000543421
- Artikelnr.: 63134344
- Verlag: Taylor & Francis
- Seitenzahl: 236
- Erscheinungstermin: 13. Februar 2022
- Englisch
- ISBN-13: 9781000543421
- Artikelnr.: 63134344
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Mark S. Merkow, CISSP, CISM, CSSLP, works at HealthEquity, Inc., in Tempe, Arizona, helping to lead application and IT security architecture and engineering efforts in the office of the CISO. In addition to his day job, Mark is a faculty member at the University of Denver, where he works on developing and instructing online courses in topics across the Information Security spectrum, with a focus on secure software development. He also works as an advisor to the University of Denver's Information and Computing Technology Curriculum Team for new course development and changes to the curriculum.
Mark has over 40 years of experience in IT in a variety of roles, including application development, systems analysis and design, security engineering, and security management. Mark holds a Master of Science in Decision and Information Systems from Arizona State University (ASU), a Master of Education in Distance Education from ASU, and a Bachelor of Science in Computer Information Systems from ASU.
Mark has over 40 years of experience in IT in a variety of roles, including application development, systems analysis and design, security engineering, and security management. Mark holds a Master of Science in Decision and Information Systems from Arizona State University (ASU), a Master of Education in Distance Education from ASU, and a Bachelor of Science in Computer Information Systems from ASU.
Dedication. Contents. List of Figures and Tables. Preface. About the Author. Chapter 1: Today
s Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development
Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon
Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
s Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development
Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon
Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
Dedication. Contents. List of Figures and Tables. Preface. About the Author. Chapter 1: Today's Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development-Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon-Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
Dedication. Contents. List of Figures and Tables. Preface. About the Author. Chapter 1: Today
s Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development
Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon
Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
s Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development
Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon
Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.
Dedication. Contents. List of Figures and Tables. Preface. About the Author. Chapter 1: Today's Software Development Practices Shatter Old Security Practices. Chapter 2: Deconstructing Agile and Scrum. Chapter 3: Learning Is FUNdamental! Chapter 4: Product Backlog Development-Building Security In. Chapter 5: Secure Design Considerations. Chapter 6: Security in the Design Sprint. Chapter 7: Defensive Programming. Chapter 8: Testing Part 1: Static Code Analysis. Chapter 9: Testing Part 2: Penetration Testing/Dynamic Analysis/IAST/RASP. Chapter 10: Securing DevOps. Chapter 11: Metrics and Models for AppSec Maturity. Chapter 12: Frontiers for AppSec. Chapter 13: AppSec Is a Marathon-Not a Sprint! Appendix A: Security Acceptance Criteria. Appendix B: Resources for AppSec. Appendix C: Answers to Chapter Quick Check Questions. Glossary. Index.