|
![]() |
|||
|
||||
OverviewPublisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product. Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference. COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFE CYCLE PROFESSIONAL EXAM DOMAINS: Secure software concepts Secure software requirements Secure software design Secure software implementation/coding Secure software testing Software acceptance Software deployment, operations, maintenance, and disposal Supply chain and software acquisitions ELECTRONIC CONTENT INCLUDES: TWO PRACTICE EXAMS PDF COPY OF THE BOOK Full Product DetailsAuthor: Wm. Arthur Conklin , Daniel ShoemakerPublisher: McGraw-Hill Education - Europe Imprint: McGraw-Hill Professional Dimensions: Width: 19.30cm , Height: 3.00cm , Length: 23.90cm Weight: 1.084kg ISBN: 9780071760263ISBN 10: 0071760261 Pages: 824 Publication Date: 16 April 2014 Audience: Professional and scholarly , Professional & Vocational Format: Book Publisher's Status: Out of Print Availability: Awaiting stock ![]() Table of ContentsPart I: Secure Software Concepts Chapter 1: Security Concepts Chapter 2: Risk Management Chapter 3: Security Policies and Regulations Chapter 4: Software Development Methodologies Part II: Secure Software Requirements Chapter 5: Policy Decomposition Chapter 6: Data Classification and Categorization Chapter 7: Requirements Part III: Secure Software Design Chapter 8: Design Processes Chapter 9: Design Considerations Chapter 10: Securing Commonly Used Architecture Chapter 11: Technologies Part IV: Secure Software Implementation/Coding Chapter 12: Common Software Vulnerabilities and Countermeasures Chapter 13: Defensive Coding Practices Chapter 14: Secure Software Coding Operations Part V: Secure Software Testing Chapter 15: Secure Quality Assurance Testing Chapter 16: Security Test Types Part VI: Secure Software Acceptance Chapter 17: Secure Software Acceptance Part VII: Secure Software Installation, Deployment, Operations, Maintenance, and Disposal Chapter 18: Secure Software Installation and Deployment Chapter 19: Secure Software Operations and Maintenance Chapter 20: Supply Chain and Software Acquisitions Part VIII: Appendices Appendix A: About the CD GlossaryReviewsAuthor InformationWm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklin’s interests are information security, systems theory, and secure software design. Dan Shoemaker, Ph. D. (University of Detroit Mercy) is the Director of the Centre for the Software Assurance Institute, a National Security Agency (NSA) Center of Academic Excellence, at the University of Detroit Mercy. He is also a Professor at UDM where he has been the Chair of Computer and Information Systems since 1985. Dr. Shoemaker is Co-Chair of the Workforce Training and Education working group within the Department of Homeland Security’s National Cybersecurity Division (NCSD). Dr. Shoemaker was one of the earliest academic participants in the development of Software Engineering as a discipline, starting at SEI in the fall of 1987. Tab Content 6Author Website:Countries AvailableAll regions |