Part I: Secure Software Concepts
Chapter 1: General Security Concepts
Chapter 2: Risk Management
Chapter 3: Security Policies and Regulations
Chapter 4: Software Development Methodologies
Part II: Secure Software Requirements
Chapter 5: Policy Decomposition
Chapter 6: Data Classification and Categorization
Chapter 7: Requirements
Part III: Secure Software Design
Chapter 8: Design Processes
Chapter 9: Design Considerations
Chapter 10: Securing Commonly Used Architectures
Chapter 11: Technologies
Part IV: Secure Software Implementation/Programming
Chapter 12: Common Software Vulnerabilities and Countermeasures
Chapter 13: Defensive Coding practices
Chapter 14: Secure Software Coding Operations
Part V: Secure Software Testing
Chapter 15: Security Quality Assurance Testing
Chapter 16: Security Test Types
Part VI: Secure Lifecycle Management
Chapter 17: Secure Lifecycle Management
Part VII: Secure Deployment, Operations, and Maintenance
Chapter 18: Secure Software Installation and Deployment
Chapter 19: Secure Software Operations and Maintenance
Part VIII: Supply Chain and Software Acquisition
Chapter 20: Supply Chain and Software Acquisition
Glossary
-
Free Shipping on all Orders Over $35!*
*excludes Marketplace items.
List Price: $70.00
Usually Ships in 24-48 Hours
$67.90
Select for Price
Online:
1825 Days access
Downloadable: Lifetime Access
Downloadable: Lifetime Access
$78.75
$78.75
We're Sorry
Sold Out
Table of Contents
An electronic version of this book is available through VitalSource.
This book is viewable on PC, Mac, iPhone, iPad, iPod Touch, and most smartphones.
By purchasing, you will be able to view this book online, as well as download it, for the chosen number of days.
A downloadable version of this book is available through the eCampus Reader or compatible Adobe readers.
Applications are available on iOS, Android, PC, Mac, and Windows Mobile platforms.
Please view the compatibility matrix prior to purchase.