Secure software development : (Record no. 294)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090325s2008 maua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2008300561 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 9781418065478 |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u1262 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Grembi, Jason. |
| 9 (RLIN) | 1060 |
| 245 10 - TITLE STATEMENT | |
| Title | Secure software development : |
| Remainder of title | a security programmer's guide / |
| Statement of responsibility, etc. | Jason Grembi. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boston, MA : |
| Name of publisher, distributor, etc. | Course Technology, |
| Date of publication, distribution, etc. | c2008. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xviii, 317 p. : |
| Other physical details | ill. ; |
| Dimensions | 24 cm. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE | |
| Formatted contents note | WHY YOU NEED TO LEARN SECURE PROGRAMMING -- CODING: NOT A SOLITARY PRACTICE -- QUALITY AND SECURITY: THE FIRST FOCUS -- GOING LIVE: WHAT TO DO -- SECURITY REQUIREMENTS -- COLLABORATING AT THE WHITEBOARD: SECURITY AND QUALITY ARE NO ACCIDENT -- DEVELOPMENT TOOLS: HOW TO CHOOSE WISELY -- CODING IN THE CUBE: LET’S GET TO WORK -- AFTER THE GLORY: MAINTAINING IT -- THE SECURITY CONSULTING COMPANIES: KNOW WHO’S OUT THERE -- THE HORIZON: MAINTAINING YOUR PROFESSION |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Learn the essentials of developing secure software in accordance with the most current industry standards, in this comprehensive instructional guide. Secure Software Development: A Programmer's Guide leads readers through the tasks and activities that successful computer programmers navigate on a daily basis, from reading and analyzing requirements to choosing development tools, to guarding against software vulnerabilities and attacks. Additional coverage includes coding with built-in quality and security measures, and follow-up testing once a project is completed. With clear, straightforward examples and actual code snippets, readers can feel confident that they will gain the skills needed to develop software with all the critical components that ensure quality and security. |
| 596 ## - | |
| -- | 1 |
| 630 00 - SUBJECT ADDED ENTRY--UNIFORM TITLE | |
| Uniform title | CIT. |
| 9 (RLIN) | 14 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 1061 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer software |
| General subdivision | Development. |
| 9 (RLIN) | 1062 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ARAOA-P | 005.8 / GR.S 2008 | 002685 | 11/24/2019 | 1 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | ACA-P | 005.8 / GR.S 2008 | 001701 | 11/24/2019 | 2 | 11/24/2019 | Books |