Software security engineering : (Record no. 132)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090226s2008 njua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008007000
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 032150917X
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1111
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
245 0# - TITLE STATEMENT
Title Software security engineering :
Remainder of title a guide for project managers /
Statement of responsibility, etc. Julia H. Allen ... [et al.].
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Upper Saddle River, NJ :
Name of publisher, distributor, etc. Addison-Wesley,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xxv, 334 p. :
Other physical details ill. ;
Dimensions 24 cm.
490 0# - SERIES STATEMENT
Series statement The Addison-Wesley software security series
490 0# - SERIES STATEMENT
Series statement The Addison-Wesley software security series
500 ## - GENERAL NOTE
General note "A CERT book"--Cover.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references (p. 291-315) and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Why Is Security a Software Issue? -- Chapter 2: What Makes Software Secure? -- Chapter 3: Requirements Engineering for Secure Software -- Chapter 4: Secure Software Architecture and Design -- Chapter 5: Considerations for Secure Coding and Testing -- Chapter 6: Security and Complexity: System Assembly Challenges -- Chapter 7: Governance, and Managing for More Secure Software.
520 ## - SUMMARY, ETC.
Summary, etc. Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book’s expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 457
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Software engineering.
9 (RLIN) 458
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer networks
General subdivision Security measures.
9 (RLIN) 459
700 1# - ADDED ENTRY--PERSONAL NAME
Personal name Allen, Julia H.
9 (RLIN) 368
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 PURCHASE   005.8 / AL.S 2008 001376 11/24/2019 1 11/24/2019 Books