LEADER 01135nam2-2200373---450- 001 990003612150203316 005 20120118100404.0 010 $a978-2-247-10977-7 035 $a000361215 035 $aUSA01000361215 035 $a(ALEPH)000361215USA01 035 $a000361215 100 $a20120118d2011----km-y0itay50------ba 101 $afre 102 $aFR 105 $a||||||||001yy 200 1 $aDroit constitutionnel$fLouis Favoreu .... [et al.] 205 $a14. ed 210 $aParis$cDalloz$d2011 215 $aXXII, 1070 p.$d21 cm 225 2 $aPrécis Dalloz$iDroit public, science politique 410 0$1001000336461$12001$aPrécis Dalloz$iDroit public, science politique 606 0 $aDiritto costituzionale$yFrancia$2BNCF 676 $a342.44 702 1$aFAVOREU,$bLouis 801 0$aIT$bsalbc$gISBD 912 $a990003612150203316 951 $aXXIV.1. Coll. 8/ 17$b72834 G.$cXXIV.1. Coll. 8/$d00305365 959 $aBK 969 $aGIU 979 $aFIORELLA$b90$c20120118$lUSA01$h0958 979 $aFIORELLA$b90$c20120118$lUSA01$h1004 996 $aDroit constitutionnel$9765473 997 $aUNISA LEADER 00825nam0-2200301 --450 001 9910469759603321 005 20230626121033.0 020 $aIT$b93-5731 100 $a20210505d1992----kmuy0itay5050 ba 101 0 $aita 102 $aIT 105 $a 001yy 200 1 $a<>via della luce$fAmos Comenio$ga cura di Cosimo Scarcella 210 $aTirrenia$cEdizioni del cerro$d1992 215 $aLII, 187 p.$d21 cm. 225 1 $aEirenikon$v5 314 $acuratore 610 0 $aComenius, Johann Amos 676 $a210$v19 700 1$aKomenský,$bJan Amos$0385136 702 1$aScarcella,$bCosimo 801 0$aIT$bUNINA$gREICAT$2UNIMARC 901 $aBK 912 $a9910469759603321 952 $aDFT A70 COMA 01$b2021/875$fFLFBC 959 $aFLFBC 996 $aVia della luce$91092933 997 $aUNINA LEADER 03393oam 2200493 450 001 9910812255803321 005 20190911103513.0 010 $a0-429-62364-X 010 $a0-429-05430-0 010 $a1-4665-6096-7 024 7 $a10.1201/b16134 035 $a(OCoLC)869311301 035 $a(MiFhGG)GVRL8QBN 035 $a(EXLCZ)993710000000079093 100 $a20131023h20142014 uy 0 101 0 $aeng 135 $aurun|---uuuua 181 $ctxt 182 $cc 183 $acr 200 10$aCore software security $esecurity at the source /$fJames Ransome and Anmol Misra ; contributing author (chapter 9): Brook Schoenfield ; foreword by Howard Schmidt 205 $a1st edition 210 1$aBoca Raton :$cCRC Press, Taylor & Francis Group,$d[2014] 210 4$d?2014 215 $a1 online resource (xxvi, 388 pages) $cillustrations 225 0 $aGale eBooks 300 $aDescription based upon print version of record. 311 $a1-4665-6095-9 320 $aIncludes bibliographical references. 327 $aFront Cover; Dedication; Contents; Foreword; Preface; Acknowledgments; About the Authors; Chapter 1 - Introduction; Chapter 2 - The Secure Development Lifecycle; Chapter 3 - Security Assessment (A1): SDL Activities and Best Practices; Chapter 4 - Architecture (A2): SDL Activities and Best Practices; Chapter 5 - Design and Development (A3): SDL Activities and Best Practices; Chapter 6 - Design and Development (A4): SDL Activities and Best Practices; Chapter 7 - Ship (A5): SDL Activities and Best Practices; Chapter 8 - Post-Release Support (PRSA1-5) 327 $aChapter 9 - Applying the SDL Framework to the Real WorldChapter 10 - Pulling It All Together: Using the SDL to Prevent Real-World Threats; Appendix - Key Success Factors, Deliverables, and Metrics for Each Phase of Our SDL Model; Back Cover 330 $aThis book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip--$cProvided by publisher. 606 $aComputer security 615 0$aComputer security. 676 $a005.8 686 $aCOM051230$aCOM053000$2bisacsh 700 $aRansome$b James F.$0627531 702 $aSchoenfield$b Brook, S. E. 801 0$bMiFhGG 801 1$bMiFhGG 906 $aBOOK 912 $a9910812255803321 996 $aCore software security$94095635 997 $aUNINA