Record ID | marc_columbia/Columbia-extract-20221130-034.mrc:6707017:4575 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-034.mrc:6707017:4575?format=raw |
LEADER: 04575cam a2200601 i 4500
001 16614123
005 20221112231348.0
006 m o d
007 cr mn|||||||||
008 131227t20142014flua ob 001 0 eng d
035 $a(OCoLC)ocn869311301
035 $a(NNC)16614123
040 $aFlBoTFG$beng$erda$epn$cSTF$dCEF$dVLB$dIDEBK$dN$T$dOSU$dYDXCP$dB24X7$dCOO$dUMI$dDEBBG$dDEBSZ$dEBLCP$dCNSPO$dCRCPR$dOCLCF$dSINTU$dOCLCQ$dGGVRL$dOCLCQ$dLIV$dMERUC$dOCLCQ$dSAV$dOCLCQ$dUAB$dOCLCA$dOCLCQ$dU3W$dNLE$dAU@$dOCLCQ$dUKMGB$dWYU$dYDX$dIDB$dLEAUB$dTYFRS$dOCLCQ$dUKAHL$dVT2$dOCLCQ$dNLW$dOCLCQ$dLND$dU@J$dELBRO$dOCLCO$dXII$dOCLCQ
015 $aGBB7A1412$2bnb
016 7 $a018373220$2Uk
019 $a866440935$a868855779$a892117623$a907643904$a918881374$a966355422$a1065727599$a1103253168$a1129353861$a1153005261$a1192329616$a1228596581$a1240530706
020 $a9781466560963$q(eBook - PDF)
020 $a1466560967$q(eBook - PDF)
020 $z9781466560956$q(hardback)
020 $z1466560959$q(hardback)
035 $a(OCoLC)869311301$z(OCoLC)866440935$z(OCoLC)868855779$z(OCoLC)892117623$z(OCoLC)907643904$z(OCoLC)918881374$z(OCoLC)966355422$z(OCoLC)1065727599$z(OCoLC)1103253168$z(OCoLC)1129353861$z(OCoLC)1153005261$z(OCoLC)1192329616$z(OCoLC)1228596581$z(OCoLC)1240530706
037 $aCL0500000486$bSafari Books Online
050 4 $aQA76.9.A25$bR356 2014
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$bR212
084 $aCOM051230$aCOM053000$2bisacsh
049 $aZCUA
100 1 $aRansome, James F.,$eauthor.
245 10 $aCore software security :$bsecurity at the source /$cJames Ransome, Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt.
264 1 $aBoca Raton :$bCRC Press, Taylor & Francis Group,$c[2014]
264 4 $c©2014
300 $a1 online resource (xxvi, 388 pages) :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
520 $a"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--$cProvided by publisher
504 $aIncludes bibliographical references and index.
505 0 $aThe secure development lifecycle -- Security assessment (A1): SDL activities and best practices -- Architecture (A2): SDL activities and best practices -- Design and development (A3): SDL activities and best practices -- Design and development (A4): SDL activities and best practices -- Ship (A5): SDL activities and best practices -- Post-release support (PRSA1-5) -- Applying the SDL framework to the real world -- Pulling it all together: using the SDL to prevent real-world threats.
588 0 $aPrint version record.
650 0 $aComputer security.
650 6 $aSécurité informatique.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
700 1 $aMisra, Anmol,$eauthor.
700 1 $aSchoenfield, Brook S. E.,$eauthor.
700 1 $aSchmidt, Howard A.,$ewriter of foreword.
776 08 $iPrint version:$aRansome, James F.$tCore software security.$dBoca Raton : Taylor & Francis, 2014$z9781466560956$w(DLC) 2013042460$w(OCoLC)785869281
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio16614123$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS