Record ID | marc_columbia/Columbia-extract-20221130-034.mrc:14522151:3272 |
Source | marc_columbia |
Download Link | /show-records/marc_columbia/Columbia-extract-20221130-034.mrc:14522151:3272?format=raw |
LEADER: 03272cam a2200541Ma 4500
001 16627269
005 20220703232401.0
006 m o d
007 cr cnu---unuuu
008 120709s2012 flua ob 000 0 eng d
035 $a(OCoLC)ocn798535861
035 $a(NNC)16627269
040 $aEBLCP$beng$epn$cEBLCP$dYDXCP$dN$T$dE7B$dB24X7$dVLB$dOCLCQ$dDEBSZ$dOCLCQ$dIDEBK$dOCLCQ$dCRCPR$dOCLCQ$dOCLCF$dOCLCQ$dLIV$dOCLCQ$dMERUC$dSAV$dOCLCQ$dUAB$dOCLCA$dOCLCQ$dCOO$dOCLCQ$dWYU$dYDX$dTYFRS$dAU@$dOCLCQ$dUKAHL$dOCLCQ$dU@J$dOCLCO
019 $a847743006$a1065696925
020 $a9781439814475$q(electronic bk.)
020 $a1439814473$q(electronic bk.)
020 $z9781439814468$q(hbk.)
020 $z1439814465$q(hbk.)
035 $a(OCoLC)798535861$z(OCoLC)847743006$z(OCoLC)1065696925
050 4 $aQA76.9.A25b
072 7 $aCOM$x060040$2bisacsh
072 7 $aCOM$x043050$2bisacsh
072 7 $aCOM$x053000$2bisacsh
082 04 $a005.8$223
049 $aZCUA
100 1 $aPaul, Mano.
245 14 $aThe 7 qualities of highly secure software /$cMano Paul.
246 3 $aSeven qualities of highly secure software
260 $aBoca Raton, FL :$bCRC Press,$c©2012.
300 $a1 online resource :$billustrations
336 $atext$btxt$2rdacontent
337 $acomputer$bc$2rdamedia
338 $aonline resource$bcr$2rdacarrier
520 $aThe 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies-ranging from Aesop's fables, athletics, architecture, biology, nursery rhymes, and video games-to illustrate the qualities that are essential for the development of highly secure software. Each chapter details one of the seven qualities that can make your software highly secure and less susceptible to hacker threats. Leveraging real-world experiences and examples, the book: explains complex security concepts in language that is easy to understand for professionals involved in management, software development, and operations; specifies the qualities and skills that are essential for building secure software; highlights the parallels between the habits of effective people.
504 $aIncludes bibliographical references.
505 0 $aQuality #1: Security Is Built In, Not Bolted On -- Quality #2: Functionality Maps to a Security Plan -- Quality #3: Includes Foundational Assurance Elements -- Quality #4: Is Balanced -- Quality #5: Incorporates Security Requirements -- Quality #6: Is Developed Collaboratively -- Quality #7: Is Adaptable -- Epilogue.
588 0 $aPrint version record.
650 0 $aComputer security.
650 6 $aSécurité informatique.
650 7 $aCOMPUTERS$xInternet$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xNetworking$xSecurity.$2bisacsh
650 7 $aCOMPUTERS$xSecurity$xGeneral.$2bisacsh
650 7 $aComputer security.$2fast$0(OCoLC)fst00872484
655 0 $aElectronic books.
655 4 $aElectronic books.
776 08 $iPrint version:$aPaul, Mano.$t7 Qualities of Highly Secure Software.$dHoboken : CRC Press, ©2012$z9781439814468
856 40 $uhttp://www.columbia.edu/cgi-bin/cul/resolve?clio16627269$zTaylor & Francis eBooks
852 8 $blweb$hEBOOKS