Security software development : (Record no. 412)
[ view plain ]
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
|---|---|
| fixed length control field | 090410s2009 flua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER | |
| LC control number | 2008015213 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
| International Standard Book Number | 1420063804 (alk. paper) |
| 035 ## - SYSTEM CONTROL NUMBER | |
| System control number | (Sirsi) u1370 |
| 040 ## - CATALOGING SOURCE | |
| Original cataloging agency | EG-CaNU |
| Transcribing agency | EG-CaNU |
| Modifying agency | EG-CaNU |
| 042 ## - AUTHENTICATION CODE | |
| Authentication code | ncode |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER | |
| Classification number | 005.8 |
| Edition number | 22 |
| 100 1# - MAIN ENTRY--PERSONAL NAME | |
| Personal name | Ashbaugh, Douglas A. |
| 9 (RLIN) | 1405 |
| 245 10 - TITLE STATEMENT | |
| Title | Security software development : |
| Remainder of title | assessing and managing security risks / |
| Statement of responsibility, etc. | Douglas A. Ashbaugh. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. | |
| Place of publication, distribution, etc. | Boca Raton : |
| Name of publisher, distributor, etc. | CRC Press, |
| Date of publication, distribution, etc. | c2009. |
| 300 ## - PHYSICAL DESCRIPTION | |
| Extent | xvii, 313 p. : |
| Other physical details | ill. ; |
| Dimensions | 25 cm. |
| 500 ## - GENERAL NOTE | |
| General note | "An Auerbach book." |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE | |
| Bibliography, etc. note | Includes bibliographical references and index. |
| 505 #0 - FORMATTED CONTENTS NOTE | |
| Formatted contents note | Current Trends in Application Security -- Security Risk Assessment Methodologies -- Identifying Assets -- Identifying Security Threats -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Analyzing Security Risks -- Managing Security Risks -- Risk Assessment and Risk Mitigation Activities in the SDLC -- Maintaining a Security Risk Assessment and Risk Management Process. |
| 520 ## - SUMMARY, ETC. | |
| Summary, etc. | Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the authors pe...Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the authors personal experience in software development. The book covers methods used to assess risk, discussing the pros and cons of each method. Readers are then guided through each step of the process. The book concludes with discussions of how to sustain a risk assessment and risk management process within an organization. |
| 596 ## - | |
| -- | 1 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer security. |
| 9 (RLIN) | 1406 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Application software |
| General subdivision | Development. |
| 9 (RLIN) | 157 |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
| Topical term or geographic name entry element | Computer networks |
| General subdivision | Security measures. |
| 9 (RLIN) | 1407 |
| Withdrawn status | Lost status | Source of classification or shelving scheme | Damaged status | Not for loan | Home library | Current library | Shelving location | Date acquired | Source of acquisition | Total Checkouts | Full call number | Barcode | Date last seen | Copy number | Price effective from | Koha item type |
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / AS.S 2009 | 001625 | 11/24/2019 | 1 | 11/24/2019 | Books | |||||
| Dewey Decimal Classification | Main library | Main library | General Stacks | 01/26/2020 | PURCHASE | 005.8 / AS.S 2009 | 004393 | 11/24/2019 | 2 | 11/24/2019 | Books |