Core software security : security at the source / James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt.

"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and...

Full description

Saved in:
Bibliographic Details
Online Access: Full Text (via Taylor & Francis)
Main Authors: Ransome, James F. (Author), Misra, Anmol (Author), Schoenfield, Brook (Author)
Other Authors: Schmidt, Howard A. (writer of foreword.)
Format: eBook
Language:English
Published: Boca Raton : CRC Press, Taylor & Francis Group, [2014]
Subjects:

MARC

LEADER 00000cam a2200000xi 4500
001 b11584301
003 CoU
005 20210115100719.3
006 m o d
007 cr |||||||||||
008 131227t20142014flua ob 001 0 eng d
010 |a 2013042460 
019 |a 866440935  |a 868855779  |a 892117623  |a 907643904  |a 918881374  |a 966355422  |a 1065727599  |a 1103253168  |a 1129353861  |a 1153005261  |a 1192329616  |a 1228596581 
020 |a 9781466560963  |q (eBook - PDF) 
020 |a 1466560967  |q (eBook - PDF) 
020 |z 9781466560956  |q (hardback) 
020 |z 1466560959  |q (hardback) 
035 |a (OCoLC)tfe869311301 
035 |a (OCoLC)869311301  |z (OCoLC)866440935  |z (OCoLC)868855779  |z (OCoLC)892117623  |z (OCoLC)907643904  |z (OCoLC)918881374  |z (OCoLC)966355422  |z (OCoLC)1065727599  |z (OCoLC)1103253168  |z (OCoLC)1129353861  |z (OCoLC)1153005261  |z (OCoLC)1192329616  |z (OCoLC)1228596581 
037 |a tfe9780429054303 
040 |a FlBoTFG  |b eng  |e rda  |e pn  |c STF  |d CEF  |d VLB  |d IDEBK  |d N$T  |d OSU  |d YDXCP  |d B24X7  |d COO  |d UMI  |d DEBBG  |d DEBSZ  |d EBLCP  |d CNSPO  |d CRCPR  |d OCLCF  |d SINTU  |d OCLCQ  |d GGVRL  |d OCLCQ  |d LIV  |d MERUC  |d OCLCQ  |d SAV  |d OCLCQ  |d UAB  |d OCLCA  |d OCLCQ  |d U3W  |d NLE  |d AU@  |d OCLCQ  |d UKMGB  |d WYU  |d YDX  |d IDB  |d LEAUB  |d TYFRS  |d OCLCQ  |d UKAHL  |d VT2  |d OCLCQ  |d NLW  |d OCLCQ  |d LND  |d U@J 
049 |a GWRE 
050 4 |a QA76.9.A25  |b R356 2014 
100 1 |a Ransome, James F.,  |e author.  |0 http://id.loc.gov/authorities/names/no2004040935  |1 http://isni.org/isni/0000000118723029. 
245 1 0 |a Core software security :  |b security at the source /  |c James Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt. 
264 1 |a Boca Raton :  |b CRC Press, Taylor & Francis Group,  |c [2014] 
264 4 |c ©20. 
264 4 |c ©2014. 
300 |a 1 online resource (xxvi, 388 pages) :  |b illustrations. 
336 |a text  |b txt  |2 rdacontent. 
337 |a computer  |b c  |2 rdamedia. 
338 |a online resource  |b cr  |2 rdacarrier. 
504 |a Includes bibliographical references and index. 
505 0 |a The secure development lifecycle -- Security assessment (A1) : SDL activities and best practices -- Architecture (A2) : SDL activities and best practices -- Design and development (A3) : SDL activities and best practices -- Design and development (A4) : SDL activities and best practices -- Ship (A5) : SDL activities and best practices -- Post-release support (PRSA1-5) -- Applying the SDL framework to the real world -- Pulling it all together : using the SDL to prevent real-world threats. 
520 |a "This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--  |c Provided by publisher. 
588 0 |a Print version record. 
650 0 |a Computer security.  |0 http://id.loc.gov/authorities/subjects/sh90001862. 
650 7 |a Computer security.  |2 fast  |0 (OCoLC)fst00872484. 
700 1 |a Misra, Anmol,  |e author.  |0 http://id.loc.gov/authorities/names/n2013013494. 
700 1 |a Schoenfield, Brook,  |e author.  |0 http://id.loc.gov/authorities/names/no2015058041. 
700 1 |a Schmidt, Howard A.,  |e writer of foreword.  |0 http://id.loc.gov/authorities/names/no2007019140  |1 http://isni.org/isni/0000000044567210. 
776 0 8 |i Print version:  |a Ransome, James F.  |t Core software security.  |d Boca Raton : Taylor & Francis, 2014  |z 9781466560956  |w (DLC) 2013042460  |w (OCoLC)785869281. 
856 4 0 |u https://colorado.idm.oclc.org/login?url=https://www.taylorfrancis.com/books/9780429054303  |z Full Text (via Taylor & Francis) 
907 |a .b115843012  |b 10-19-21  |c 01-22-21 
998 |a web  |b 06-23-21  |c b  |d b   |e -  |f eng  |g flu  |h 0  |i 1 
907 |a .b115843012  |b 10-19-21  |c 01-22-21 
907 |a .b115843012  |b 07-01-21  |c 01-22-21 
907 |a .b115843012  |b 06-23-21  |c 01-22-21 
944 |a MARS - RDA ENRICHED 
915 |a I 
956 |a Taylor & Francis eBooks 
956 |b Taylor & Francis All eBooks 
999 f f |i 0841ec87-061c-5033-ae2d-ddafb52d6737  |s a8245f4d-d4e7-5622-956e-4a3150f378ce 
952 f f |p Can circulate  |a University of Colorado Boulder  |b Online  |c Online  |d Online  |e QA76.9.A25 R356 2014  |h Library of Congress classification  |i web  |n 1