LEADER 02981nam 2200529 450 001 9910798238503321 005 20200520144314.0 035 $a(CKB)3710000000612110 035 $a(MiAaPQ)EBC4395800 035 $a(NjHacI)993710000000612110 035 $a(Au-PeEL)EBL4395800 035 $a(CaPaEBR)ebr11155271 035 $a(OCoLC)941700561 035 $a(EXLCZ)993710000000612110 100 $a20160315d2015 uy| 0 101 0 $aeng 135 $aur||||||||||| 181 $ctxt$2rdacontent 182 $cc$2rdamedia 183 $acr$2rdacarrier 200 10$aApplication security in the ISO 27001:2013 environment /$fVinod Vasudevan [and five others] 205 $aSecond edition. 210 1$aEly Cambridgeshire :$cIT Governance Publishing,$d2015. 215 $a1 online resource (254 pages) $cillustrations 311 $a1-84928-767-8 320 $aIncludes bibliographical references. 327 $aCover; Title; Copyright; Preface; About The Authors; Acknowledgements; Contents; Chapter 1: Introduction To The International Information Security Standards Iso27001 And Iso27002; Chapter 2: The Iso27001 Implementation Project; Chapter 3: Risk Assessment; Chapter 4: Introduction To Application Security Theats; Chapter 5: Application Security And Iso27001; Chapter 6: Attacks On Applications; Chapter 7: Secure Development Lifecycle; Chapter 8: Threat Profiling And Security Testing; Chapter 9: Secure Coding Guidelines; Itg Resources. 330 $aThis book explains how organisations can implement and maintain effective security practices to protect their web applications and the servers on which they reside as part of a wider information security management system by following the guidance set out in the international standard for information security management, ISO27001. Methods used by criminal hackers to attack organisations via their web applications and a detailed explanation of how you can combat such attacks by employing the guidance and controls set out in ISO27001 are provided. This edition is updated to reflect ISO27001:2013 as well as best practices relating to cryptography, including the PCI SSC's denigration of SSL in favour of TLS. -- Edited summary from book. 606 $aData protection$xStandards 606 $aComputer security 606 $aComputer networks$xSecurity measures$xStandards 606 $aInformation technology$xStandards 606 $aComputer software$xReliability 615 0$aData protection$xStandards. 615 0$aComputer security. 615 0$aComputer networks$xSecurity measures$xStandards. 615 0$aInformation technology$xStandards. 615 0$aComputer software$xReliability. 676 $a005.8 700 $aVasudevan$b Vinod$01553960 801 0$bMiAaPQ 801 1$bMiAaPQ 801 2$bMiAaPQ 906 $aBOOK 912 $a9910798238503321 996 $aApplication security in the ISO 27001:2013 environment$93814851 997 $aUNINA