Secure software development : (Record no. 294)

MARC details
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 090325s2008 maua b 001 0 eng
010 ## - LIBRARY OF CONGRESS CONTROL NUMBER
LC control number 2008300561
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781418065478
035 ## - SYSTEM CONTROL NUMBER
System control number (Sirsi) u1262
040 ## - CATALOGING SOURCE
Original cataloging agency EG-CaNU
Transcribing agency EG-CaNU
Modifying agency EG-CaNU
042 ## - AUTHENTICATION CODE
Authentication code ncode
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER
Classification number 005.8
Edition number 22
100 1# - MAIN ENTRY--PERSONAL NAME
Personal name Grembi, Jason.
9 (RLIN) 1060
245 10 - TITLE STATEMENT
Title Secure software development :
Remainder of title a security programmer's guide /
Statement of responsibility, etc. Jason Grembi.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Boston, MA :
Name of publisher, distributor, etc. Course Technology,
Date of publication, distribution, etc. c2008.
300 ## - PHYSICAL DESCRIPTION
Extent xviii, 317 p. :
Other physical details ill. ;
Dimensions 24 cm.
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 0# - FORMATTED CONTENTS NOTE
Formatted contents note WHY YOU NEED TO LEARN SECURE PROGRAMMING -- CODING: NOT A SOLITARY PRACTICE -- QUALITY AND SECURITY: THE FIRST FOCUS -- GOING LIVE: WHAT TO DO -- SECURITY REQUIREMENTS -- COLLABORATING AT THE WHITEBOARD: SECURITY AND QUALITY ARE NO ACCIDENT -- DEVELOPMENT TOOLS: HOW TO CHOOSE WISELY -- CODING IN THE CUBE: LET’S GET TO WORK -- AFTER THE GLORY: MAINTAINING IT -- THE SECURITY CONSULTING COMPANIES: KNOW WHO’S OUT THERE -- THE HORIZON: MAINTAINING YOUR PROFESSION
520 ## - SUMMARY, ETC.
Summary, etc. Learn the essentials of developing secure software in accordance with the most current industry standards, in this comprehensive instructional guide. Secure Software Development: A Programmer's Guide leads readers through the tasks and activities that successful computer programmers navigate on a daily basis, from reading and analyzing requirements to choosing development tools, to guarding against software vulnerabilities and attacks. Additional coverage includes coding with built-in quality and security measures, and follow-up testing once a project is completed. With clear, straightforward examples and actual code snippets, readers can feel confident that they will gain the skills needed to develop software with all the critical components that ensure quality and security.
596 ## -
-- 1
630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE
Uniform title CIT.
9 (RLIN) 14
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 1061
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer software
General subdivision Development.
9 (RLIN) 1062
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Home library Current library Shelving location Date acquired Source of acquisition Total Checkouts Full call number Barcode Date last seen Copy number Price effective from Koha item type
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ARAOA-P   005.8 / GR.S 2008 002685 11/24/2019 1 11/24/2019 Books
    Dewey Decimal Classification     Main library Main library General Stacks 01/26/2020 ACA-P   005.8 / GR.S 2008 001701 11/24/2019 2 11/24/2019 Books