| 000 | 02492cam a2200265 a 4500 | ||
|---|---|---|---|
| 008 | 090410s2009 flua b 001 0 eng | ||
| 010 | _a2008015213 | ||
| 020 | _a1420063804 (alk. paper) | ||
| 035 | _a(Sirsi) u1370 | ||
| 040 |
_aEG-CaNU _cEG-CaNU _dEG-CaNU |
||
| 042 | _ancode | ||
| 082 | 0 | 0 |
_a005.8 _2 22 |
| 100 | 1 |
_aAshbaugh, Douglas A. _91405 |
|
| 245 | 1 | 0 |
_aSecurity software development : _b assessing and managing security risks / _c Douglas A. Ashbaugh. |
| 260 |
_aBoca Raton : _b CRC Press, _c c2009. |
||
| 300 |
_axvii, 313 p. : _b ill. ; _c 25 cm. |
||
| 500 | _a"An Auerbach book." | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aCurrent Trends in Application Security -- Security Risk Assessment Methodologies -- Identifying Assets -- Identifying Security Threats -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Identifying Vulnerabilities -- Analyzing Security Risks -- Managing Security Risks -- Risk Assessment and Risk Mitigation Activities in the SDLC -- Maintaining a Security Risk Assessment and Risk Management Process. | |
| 520 | _aExamining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the authors pe...Examining current trends and problems that have plagued application development for more than a decade, this book provides a foundation for security risk assessment and management during software development. It demonstrates how to achieve greater application security through assessing and managing risk throughout the entire software development life cycle using a test case based on the authors personal experience in software development. The book covers methods used to assess risk, discussing the pros and cons of each method. Readers are then guided through each step of the process. The book concludes with discussions of how to sustain a risk assessment and risk management process within an organization. | ||
| 650 | 0 |
_aComputer security. _91406 |
|
| 650 | 0 |
_aApplication software _x Development. _9157 |
|
| 650 | 0 |
_aComputer networks _x Security measures. _91407 |
|
| 596 | _a1 | ||
| 999 |
_c412 _d412 |
||