It looks like you're offline.
Open Library logo
additional options menu

MARC Record from Library of Congress

Record ID marc_loc_2016/BooksAll.2016.part40.utf8:257536614:2240
Source Library of Congress
Download Link /show-records/marc_loc_2016/BooksAll.2016.part40.utf8:257536614:2240?format=raw

LEADER: 02240cam a22003134i 4500
001 2013042460
003 DLC
005 20141016080556.0
008 131023s2014 flua b 001 0 eng
010 $a 2013042460
020 $a9781466560956 (hardback)
040 $aDLC$beng$cDLC$erda$dDLC
042 $apcc
050 00 $aQA76.9.A25$bR356 2014
082 00 $a005.8$223
084 $aCOM051230$aCOM053000$2bisacsh
100 1 $aRansome, James F.
245 10 $aCore software security :$bsecurity at the source /$cJames Ransome and Anmol Misra.
264 1 $aBoca Raton :$bTaylor & Francis,$c2014.
300 $axxvi, 388 pages :$billustrations ;$c24 cm.
336 $atext$2rdacontent
337 $aunmediated$2rdamedia
338 $avolume$2rdacarrier
520 $a"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"--$cProvided by publisher.
504 $aIncludes bibliographical references and index.
650 0 $aComputer security.
650 7 $aCOMPUTERS / Software Development & Engineering / General.$2bisacsh
650 7 $aCOMPUTERS / Security / General.$2bisacsh
856 42 $3Cover image$uhttp://images.tandf.co.uk/common/jackets/websmall/978146656/9781466560956.jpg