• Wyszukiwanie zaawansowane
  • Kategorie
  • Kategorie BISAC
  • Książki na zamówienie
  • Promocje
  • Granty
  • Książka na prezent
  • Opinie
  • Pomoc
  • Załóż konto
  • Zaloguj się

Official (ISC)2 Guide to the CSSLP CBK » książka

zaloguj się | załóż konto
Logo Krainaksiazek.pl

koszyk

konto

szukaj
topmenu
Księgarnia internetowa
Szukaj
Książki na zamówienie
Promocje
Granty
Książka na prezent
Moje konto
Pomoc
 
 
Wyszukiwanie zaawansowane
Pusty koszyk
Bezpłatna dostawa dla zamówień powyżej 20 złBezpłatna dostawa dla zamówień powyżej 20 zł

Kategorie główne

• Nauka
 [2949965]
• Literatura piękna
 [1857847]

  więcej...
• Turystyka
 [70818]
• Informatyka
 [151303]
• Komiksy
 [35733]
• Encyklopedie
 [23180]
• Dziecięca
 [617748]
• Hobby
 [139972]
• AudioBooki
 [1650]
• Literatura faktu
 [228361]
• Muzyka CD
 [398]
• Słowniki
 [2862]
• Inne
 [444732]
• Kalendarze
 [1620]
• Podręczniki
 [167233]
• Poradniki
 [482388]
• Religia
 [509867]
• Czasopisma
 [533]
• Sport
 [61361]
• Sztuka
 [243125]
• CD, DVD, Video
 [3451]
• Technologie
 [219309]
• Zdrowie
 [101347]
• Książkowe Klimaty
 [123]
• Zabawki
 [2362]
• Puzzle, gry
 [3791]
• Literatura w języku ukraińskim
 [253]
• Art. papiernicze i szkolne
 [7933]
Kategorie szczegółowe BISAC

Official (ISC)2 Guide to the CSSLP CBK

ISBN-13: 9781466571273 / Angielski / Twarda / 2013 / 800 str.

Mano Paul
Official (ISC)2 Guide to the CSSLP CBK Mano Paul 9781466571273 Taylor & Francis Ltd - książkaWidoczna okładka, to zdjęcie poglądowe, a rzeczywista szata graficzna może różnić się od prezentowanej.

Official (ISC)2 Guide to the CSSLP CBK

ISBN-13: 9781466571273 / Angielski / Twarda / 2013 / 800 str.

Mano Paul
cena 404,81 zł
(netto: 385,53 VAT:  5%)

Najniższa cena z 30 dni: 400,67 zł
Termin realizacji zamówienia:
ok. 22 dni roboczych
Bez gwarancji dostawy przed świętami

Darmowa dostawa!

The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.

Kategorie:
Informatyka, Programowanie
Kategorie BISAC:
Computers > Software Development & Engineering - General
Computers > Security - General
Computers > Certification Guides - General
Wydawca:
Taylor & Francis Ltd
Język:
Angielski
ISBN-13:
9781466571273
Rok wydania:
2013
Numer serii:
000323126
Ilość stron:
800
Waga:
1.51 kg
Wymiary:
25.4 x 18.54 x 4.32
Oprawa:
Twarda
Wolumenów:
01
Dodatkowe informacje:
Wydanie ilustrowane

Domain 1 - Secure Software ConceptsHolistic SecurityImplementation ChallengesIron Triangle ConstraintsSecurity as an AfterthoughtSecurity vs. UsabilityQuality and SecuritySecurity Profile – What Makes Software Secure?Core Security Concepts Design Security ConceptsRisk ManagementTerminology and DefinitionsRisk Management for SoftwareHandling RiskRisk Management Concept: SummarySecurity Policies: The ‘What’ and ‘Why’ for SecurityScope of the Security PoliciesPrerequisites for Security Policy DevelopmentSecurity Policy Development Process Security StandardsTypes of Security StandardsInternal Coding StandardsNIST StandardsFederal Information Processing (FIPS) standardsISO StandardsPCI StandardsOrganization for the Advancement of Structured Information Standards (OASIS)Benefits of Security Standards Best PracticesOpen Web Application Security Project (OWASP)Information Technology Infrastructure Library (ITIL)Software Development MethodologiesWaterfall ModelIterative ModelSpiral ModelAgile Development MethodologiesSoftware Assurance MethodologiesSocratic MethodologySix Sigma (6 σ) Capability Maturity Model Integration (CMMI)Operationally Critical Threat, Asset and Vulnerability Evaluation (OCTAVE®)STRIDE and DREADOpen Source Security Testing Methodology Manual (OSSTMM)Flaw Hypothesis Method (FHM)Enterprise Application and Security FrameworksZachman FrameworkControl Objectives for Information and related Technology (COBIT®)Committee of Sponsoring Organizations (COSO)Sherwood Applied Business Security Architecture (SABSA) Regulations, Privacy and Compliance Significant Regulations and Privacy ActsSarbanes-Oxley Act (SOX) BASEL II Gramm-Leach-Bliley Act (GLB Act)Health Insurance Portability and Accountability Act (HIPAA)Data Protection Act Computer Misuse ActMobile Device Privacy ActState Security Breach LawsPrivacy and Software DevelopmentData AnonymizationDispositionSecurity ModelsTrusted ComputingRing ProtectionTrust Boundary (or Security Perimeter)Trusted Computing Base (TCB) Reference MonitorAcquisitionsDomain 2 - Secure Software RequirementsSources for Security RequirementsTypes of Security RequirementsCore Security RequirementsGeneral RequirementsOperational RequirementsOther RequirementsProtection Needs Elicitation (PNE)BrainstormingSurveys (Questionnaires and Interviews)Policy Decomposition Data ClassificationSubject/Object Matrix Use Case & Misuse Case ModelingRequirements Traceability Matrix (RTM)Domain 3 - Secure Software DesignThe Need for Secure DesignFlaws versus BugsArchitecting Software with Core Security ConceptsConfidentiality DesignIntegrity DesignAvailability DesignAuthentication DesignAuthorization DesignAccountability DesignArchitecting Software with Secure Design PrinciplesLeast PrivilegeSeparation of Duties Defense in Depth Fail Secure Economy of MechanismsComplete MediationOpen DesignLeast Common Mechanisms Psychological Acceptability Weakest LinkLeveraging Existing Components Balancing Secure Design PrinciplesOther Design ConsiderationsInterface Design InterconnectivityDesign ProcessesAttack Surface EvaluationThreat ModelingArchitecturesMainframe ArchitectureDistributed ComputingService Oriented Architecture Rich Internet ApplicationsPervasive/Ubiquitous ComputingCloud Computing Mobile ApplicationsIntegration with Existing ArchitecturesTechnologies Authentication Identity ManagementCredential ManagementFlow Control Auditing (Logging)Trusted Computing Database SecurityProgramming Language EnvironmentOperating Systems Embedded SystemsSecure Design and Architecture ReviewDomain 4 - Secure Software Implementation/CodingWho is to be Blamed for Insecure Software?Fundamental Concepts of ProgrammingComputer ArchitectureEvolution of Programming LanguagesCommon Software Vulnerabilities and Controls Buffer Overflow Stack OverflowHeap OverflowInjection FlawsBroken Authentication and Session ManagementCross-Site Scripting (XSS) Non-persistent or Reflected XSSPersistent or Stored XSSDOM based XSSInsecure Direct Object ReferencesSecurity MisconfigurationSensitive Data ExposureMissing Function Level ChecksCross-Site Request Forgery (CSRF)Using Known Vulnerable ComponentsUnvalidated Redirects and Forwards File Attacks Race ConditionSide Channel AttacksDefensive Coding Practices – Concepts and TechniquesInput Validation Canonicalization SanitizationError Handling Safe APIs Memory Management Exception ManagementSession ManagementConfiguration Parameters ManagementSecure StartupCryptography ConcurrencyTokenizationSandboxingAnti-Tampering Secure Software ProcessesVersion (Configuration Management)Code AnalysisCode/Peer ReviewSecuring Build EnvironmentsDomain 5 -Secure Software TestingQuality AssuranceTesting ArtifactsTest StrategyTest PlanTest CaseTest ScriptTest SuiteTest HarnessTypes of Software QA TestingFunctional TestingNon-Functional TestingOther TestingAttack Surface Validation (Security Testing)Motives, Opportunities and MeansTesting of Security Functionality versus Security TestingThe Need for Security TestingSecurity Testing MethodsWhite Box TestingBlack Box TestingWhite Box Testing versus Black Box TestingTypes of Security TestingCryptographic Validation TestingScanningFuzzingSoftware Security TestingTesting for Input Validation Testing for Injection Flaws ControlsTesting for Scripting Attacks ControlsTesting for Non-repudiation ControlsTesting for Spoofing ControlsTesting for Error and Exception Handling Controls (Failure Testing)Testing for Privileges Escalations ControlsAnti-Reversing Protection TestingTools for Security TestingTest Data Management Defect Reporting and TrackingReporting DefectsTracking DefectsImpact Assessment and Corrective ActionDomain 6 - Software AcceptanceGuidelines for Software AcceptanceBenefits of Accepting Software FormallySoftware Acceptance Considerations Completion CriteriaChange ManagementApproval to Deploy or ReleaseRisk Acceptance and Exception PolicyDocumentation of SoftwareVerification and Validation (V&V) ReviewsTestingCertification and Accreditation (C&A)Domain 7 - Software Deployment, Operations, Maintenance, and DisposalInstallation and DeploymentHardening Environment Configuration Release ManagementBootstrapping and Secure StartupOperations and Maintenance Monitoring Incident Management Problem Management Change ManagementBackups, Recovery and ArchivingDisposal End-of-Life Policies Sun-Setting CriteriaSun-setting ProcessesInformation Disposal and Media SanitizationDomain 8 - Supply Chain and Software AcquisitionSoftware Acquisition and the Supply Chain Acquisition Lifecycle Software Acquisition Models and Benefits Supply Chain Software GoalsThreats to Supply Chain SoftwareSoftware Supply Chain Risk Management (SCRM) Supplier Risk Assessment and ManagementSupplier SourcingContractual ControlsIntellectual Property (IP) Ownership and ResponsibilitiesTypes of Intellectual Property (IP) Licensing (Usage and Redistribution Terms)Software Development and TestingAssurance Requirement Conformance ValidationCode ReviewCode Repository SecurityBuild Tools and Environment IntegrityTesting for Code SecuritySoftware SCRM during AcceptanceAnti-Tampering Resistance and Controls Authenticity and Anti-Counterfeiting ControlsSupplier Claims VerificationSoftware SCRM during Delivery (Handover)Chain of Custody Secure TransferCode EscrowsExport Control and Foreign Trade Data Regulations ComplianceSoftware SCRM during Deployment (Installation/Configuration)Secure ConfigurationPerimeter (Network) Security ControlsSystem-of-Systems (SoS) SecuritySoftware SCRM during Operations and MaintenanceRuntime Integrity AssurancePatching and UpgradesTermination Access ControlsCustom Code Extensions ChecksContinuous Monitoring and Incident ManagementSoftware SCRM during RetirementAppendices Answers to Review QuestionsSecurity ModelsThreat ModelingCommonly Used Opcodes in AssemblyHTTP/1.1 Status Codes and Reason Phrases (IETF RFC 2616)Security Testing Tools



Udostępnij

Facebook - konto krainaksiazek.pl



Opinie o Krainaksiazek.pl na Opineo.pl

Partner Mybenefit

Krainaksiazek.pl w programie rzetelna firma Krainaksiaze.pl - płatności przez paypal

Czytaj nas na:

Facebook - krainaksiazek.pl
  • książki na zamówienie
  • granty
  • książka na prezent
  • kontakt
  • pomoc
  • opinie
  • regulamin
  • polityka prywatności

Zobacz:

  • Księgarnia czeska

  • Wydawnictwo Książkowe Klimaty

1997-2025 DolnySlask.com Agencja Internetowa

© 1997-2022 krainaksiazek.pl
     
KONTAKT | REGULAMIN | POLITYKA PRYWATNOŚCI | USTAWIENIA PRYWATNOŚCI
Zobacz: Księgarnia Czeska | Wydawnictwo Książkowe Klimaty | Mapa strony | Lista autorów
KrainaKsiazek.PL - Księgarnia Internetowa
Polityka prywatnosci - link
Krainaksiazek.pl - płatnośc Przelewy24
Przechowalnia Przechowalnia