Security software development : assessing and managing security risks / Douglas A. Ashbaugh.
نوع المادة :![نص](/opac-tmpl/lib/famfamfam/BK.png)
- text
- unmediated
- volume
- 9781420063806 (hbk)
- QA76.9.A25 A8246 2009
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 A8246 2009 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011318368 | ||
![]() |
UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | QA76.9.A25 A8246 2009 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011318369 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
QA76.9.A25 A52 2010 Seven deadliest USB attacks / | QA76.9.A25 A52 2010 Seven deadliest USB attacks / | QA76.9.A25 A53 1996 An exploration of cyberspace security R&D investment strategies for DARPA : "the day after-- in cyberspace II" | QA76.9.A25 A8246 2009 Security software development : assessing and managing security risks / | QA76.9.A25 A8246 2009 Security software development : assessing and managing security risks / | QA76.9.A25 B33 1995 The computer privacy handbook / | QA76.9.A25 B335 2008 Building an effective information security policy architecture / |
"An Auerbach book."
Includes bibliographical references and index.
Front cover; Contents; Preface; Acknowledgments; Author Biography; Chapter 1. Current Trends in Application Security; Chapter 2. Security Risk Assessment Methodologies; Chapter 3. Identifying Assets; Chapter 4. Identifying Security Threats; Chapter 5. Identifying Vulnerabilities; Chapter 6. Analyzing Security Risks; Chapter 7. Managing Security Risks; Chapter 8. Risk Assessment and Risk Mitigation Activities in the SDLC; Chapter 9. Maintaining a Security Risk Assessment and Risk Management Process; Index; Back cover;
Examines trends and problems that have plagued application development. This book demonstrates how to achieve greater application security. It covers methods used to assess risk, discussing the pros and cons of each method, and concludes with discussions of how to sustain a risk assessment and risk management process within an organization.