libri scuola books Fumetti ebook dvd top ten sconti 0 Carrello


Torna Indietro

paul mano - official (isc)2 guide to the csslp
Zoom

Official (ISC)2 Guide to the CSSLP




Disponibilità: Normalmente disponibile in 20 giorni
A causa di problematiche nell'approvvigionamento legate alla Brexit sono possibili ritardi nelle consegne.


PREZZO
136,98 €
NICEPRICE
130,13 €
SCONTO
5%



Questo prodotto usufruisce delle SPEDIZIONI GRATIS
selezionando l'opzione Corriere Veloce in fase di ordine.


Pagabile anche con Carta della cultura giovani e del merito, 18App Bonus Cultura e Carta del Docente


Facebook Twitter Aggiungi commento


Spese Gratis

Dettagli

Genere:Libro
Lingua: Inglese
Editore:

CRC Press

Pubblicazione: 06/2011
Edizione: 1° edizione





Note Editore

As the global leader in information security education and certification, (ISC)2® has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP®) is a testament to the organization’s ongoing commitment to information and software security.The Official (ISC)2® Guide to the CSSLP®provides an all-inclusive analysis of the CSSLP Common Body of Knowledge (CBK®). As the first comprehensive guide to the CSSLP CBK, it facilitates the required understanding of the seven CSSLP domains—Secure Software Concepts, Secure Software Requirements, Secure Software Design, Secure Software Implementation/Coding, Secure Software Testing, Software Acceptance, and Software Deployment, Operations, Maintenance and Disposal—to assist candidates for certification and beyond. Serves as the only official guide to the CSSLP professional certification Details the software security activities that need to be incorporated throughout the software development lifecycle Provides comprehensive coverage that includes the people, processes, and technology components of software, networks, and host defenses Supplies a pragmatic approach to implementing software assurances in the real-world The text allows readers to learn about software security from a renowned security practitioner who is the appointed software assurance advisor for (ISC)2. Complete with numerous illustrations, it makes complex security concepts easy to understand and implement. In addition to being a valuable resource for those studying for the CSSLP examination, this book is also an indispensable software security reference for those already part of the certified elite. A robust and comprehensive appendix makes this book a time-saving resource for anyone involved in secure software development.




Sommario

Secure Software ConceptsIntroduction ObjectivesHolistic SecurityImplementation ChallengesQuality and SecurityDesign Security ConceptsSecurity Concepts in the SDLCSecurity Policies: The What and Why of SecuritySecurity MethodologiesSecurity FrameworksRegulations, Privacy, and ComplianceAcquisitions Summary Review QuestionsReferences Secure Software RequirementsIntroduction ObjectivesSources for Security RequirementsSummary Review QuestionsReferences Secure Software DesignIntroductionObjectivesThe Need for Secure DesignSecure Design and Architecture ReviewSummary Review QuestionsReferences Secure Software Implementation / CodingIntroduction ObjectivesWho is to be blamed for Insecure Software?Fundamental Concepts of ProgrammingSoftware Development MethodologiesCommon Software Vulnerabilities and CountermeasuresDefensive Coding PracticesSecure Software ProcessesSummary Review QuestionsCommonly Used Opcodes in AssemblyHTTP/1.1 Status Codes and Reason Phrases (IETF RFC 2616)References Secure Software Testing Introduction Objectives Quality AssuranceSoftware Security TestingDefect Reporting and TrackingTools for Security TestingSummary Review QuestionsChapter Appendix: Security Testing Tools Reconnaissance Tools Vulnerability Scanners Fingerprinting Tools Sniffers/Protocol Analyzers Password Crackers Web Security Tools: Scanners, Proxies, and Vulnerability Management Wireless Security Tools Reverse Engineering Tools Source Code Analyzers Vulnerability Exploitation Tools Security-Oriented Operating Systems Privacy Testing Tools ReferencesSoftware AcceptanceIntroductionObjectivesGuidelines for Software AcceptanceLegal Protection MechanismVerification and ValidationSummaryReview Questions Software Deployment, Operations, Maintenance, and DisposalIntroductionObjectivesInstallation and DeploymentOperations and MaintenanceDisposalSummaryReview QuestionsAppendix Index




Autore

Manoranjan (Mano) Paul is the Software Assurance Advisor for the (ISC)2, the global leader in information security education and certification, representing and advising the organization on software assurance strategy, training, education and certification. His information security and software assurance experience includes designing and developing security programs from compliance-to-coding, security in the SDLC, writing secure code, risk management, security strategy, and security awareness training and education. Mr. Paul started his career as a shark researcher in the Bimini Biological Field Station, Bahamas. His educational pursuit took him to the University of Oklahoma where he received his Business Administration degree in Management Information Systems (MIS) with various accolades and the coveted 4.0 GPA. Following his entrepreneurial acumen, he founded and serves as the CEO & President of Express Certifications, a professional certification assessment and training company that developed studISCope, (ISC)2's official self assessment offering for prospective certification candidates. Express Certifications is also the self assessment testing company behind the US Department of Defense certification education program as mandated by the 8570.1 directive. He also founded SecuRisk Solutions, a company that specializes in security product development and consulting. Before Express Certifications and SecuRisk Solutions, Mr. Paul played several roles from software developer, quality assurance engineer, logistics manager, technical architect, IT strategist, and security engineer/program manager/strategist at Dell Inc. Mr. Paul is an appointed faculty member and Vice President of the Capitol of Texas Information System Security Association (ISSA) chapter. He is a contributing author for the Information Security Management Handbook, writes periodically for the Certification magazine and has contributed to security topics for the Microsoft Solutions Developer Network (MSDN). He has been featured in various domestic and international security conferences and is an invited speaker and panelist, delivering talks and keynotes in conferences such as the CSI (Computer Security Institute), Burton Group Catalyst, SC World Congress, TRISC (Texas Regional Infrastructure Security Conference) and OWASP. Mr. Paul holds the following professional certifications - CSSLP, CISSP, AMBCI, MCSD, MCAD, CompTIA Network+ and the ECSA certification.










Altre Informazioni

ISBN:

9781439826058

Condizione: Nuovo
Collana: (ISC)2 Press
Dimensioni: 9.25 x 6.25 in Ø 7.87 lb
Formato: Copertina rigida
Illustration Notes:131 b/w images and 37 tables
Pagine Arabe: 572


Dicono di noi