Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 244,11
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 243,55
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 261,77
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 256,35
Quantité disponible : 3 disponible(s)
Ajouter au panierEtat : New.
Vendeur : GreatBookPricesUK, Woodford Green, Royaume-Uni
EUR 249,94
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 276,22
Quantité disponible : 3 disponible(s)
Ajouter au panierEtat : New. 1st edition NO-PA16APR2015-KAP.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 291,19
Quantité disponible : 3 disponible(s)
Ajouter au panierEtat : New.
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 357,74
Quantité disponible : 2 disponible(s)
Ajouter au panierHardcover. Etat : Brand New. 288 pages. 10.00x7.00x0.83 inches. In Stock.
Vendeur : moluna, Greven, Allemagne
EUR 211,74
Quantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. James Ransome, PhD, CISSP, CISM is the Chief Scientist for CYBERPHOS, an early-stage cybersecurity startup. He is also a member of the board of directors for the Bay Area Chief Security Officer Council. Most recently, James was the Senio.
Vendeur : PBShop.store UK, Fairford, GLOS, Royaume-Uni
EUR 284,30
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Delivered from our UK warehouse in 4 to 14 business days. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : PBShop.store US, Wood Dale, IL, Etats-Unis
EUR 288,35
Quantité disponible : Plus de 20 disponibles
Ajouter au panierHRD. Etat : New. New Book. Shipped from UK. THIS BOOK IS PRINTED ON DEMAND. Established seller since 2000.
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 347,45
Quantité disponible : 1 disponible(s)
Ajouter au panierBuch. Etat : Neu. nach der Bestellung gedruckt Neuware - Printed after ordering - As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans.The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process.The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model.Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.