Personnaliser

OK

Practical Core Software Security - Ransome, James F.

Note : 0

0 avis
  • Soyez le premier à donner un avis

Vous en avez un à vendre ?

Vendez-le-vôtre

328,80 €

Produit Neuf

  • Ou 82,20 € /mois

    • Livraison à 0,01 €
    • Livré entre le 7 et le 15 mai
    Voir les modes de livraison

    RiaChristie

    PRO Vendeur favori

    4,9/5 sur + de 1 000 ventes

    Brand new, In English, Fast shipping from London, UK; Tout neuf, en anglais, expédition rapide depuis Londres, Royaume-Uni;ria9781032333144_dbm

    Publicité
     
    Vous avez choisi le retrait chez le vendeur à
    • Payez directement sur Rakuten (CB, PayPal, 4xCB...)
    • Récupérez le produit directement chez le vendeur
    • Rakuten vous rembourse en cas de problème

    Gratuit et sans engagement

    Félicitations !

    Nous sommes heureux de vous compter parmi nos membres du Club Rakuten !

    En savoir plus

    Retour

    Horaires

        Note :


        Avis sur Practical Core Software Security de Ransome, James F. Format Relié  - Livre Informatique

        Note : 0 0 avis sur Practical Core Software Security de Ransome, James F. Format Relié  - Livre Informatique

        Les avis publiés font l'objet d'un contrôle automatisé de Rakuten.


        Présentation Practical Core Software Security de Ransome, James F. Format Relié

         - Livre Informatique

        Livre Informatique - Ransome, James F. - 01/08/2022 - Relié - Langue : Anglais

        . .

      • Auteur(s) : Ransome, James F. - Misra, Anmol - Merkow, Mark S.
      • Editeur : Auerbach Publications
      • Langue : Anglais
      • Parution : 01/08/2022
      • Format : Moyen, de 350g à 1kg
      • Nombre de pages : 288
      • Expédition : 717
      • Dimensions : 26.0 x 18.3 x 2.0
      • ISBN : 9781032333144



      • Résumé :

        1. Introduction 2. The Security Development Lifecycle 3. Security Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2): SDL Activities and Best Practices 5. Design and Development (A3): SDL Activities and Best Practices 6. Design and Development (A4): SDL Activities and Best Practices 7. Ship (A5): SDL Activities and Best Practices 8. Post-Release Support (PRSA1-5) 9. Adapting Our Reference Framework to Your Environment A. Case Study for Chapters 3 Through 8 Exercises B. Answers to Quick-Check Questions

        ...

        Biographie:

        James Ransome, PhD, CISSP, CISM is the Chief Scientist for CYBERPHOS, an early-stage cybersecurity startup. He is also a member of the board of directors for the Bay Area Chief Security Officer Council. Most recently, James was the Senior Director of Security Development Lifecycle Engineering for Intel's Product Assurance and Security (IPAS). In that capacity, he led a team of SDL engineers, architects, and product security experts to drive and implement security practices across the company. Prior to that, James was the Senior Director of Product Security and PSIRT at Intel Security (formerly McAfee).

        Anmol Misra is an accomplished leader, researcher, author, and security expert, with over 16 years of experience in technology and cybersecurity. His engineering, security, and consulting background makes him uniquely suited to drive the adoption of disruptive technologies. He is a team builder focused on mentoring and nurturing high-potential leaders, fostering excellence, and building industry partnerships. He is known for his pragmatic approach to security.

        Mark S. Merkow, CISSP, CISM, CSSLP has over 25 years of experience in corporate information security and 17 years in the AppSec space helping to establish and lead application security initiatives to success and sustainment. Mark is a faculty member at the University of Denver, where he works developing and instructing online courses in topics across the Information Security spectrum, with a focus on secure software development. He also works as an advisor to the University of Denver's Information and Computing Technology Curriculum Team for new course development and changes to the curriculum and for Strayer University as an advisor to the undergraduate and graduate programs in information security.

        ...

        Sommaire:

        1. Introduction 2. The Security Development Lifecycle 3. Security Assessment (A1): SDL Activities and Best Practices 4. Architecture (A2): SDL Activities and Best Practices 5. Design and Development (A3): SDL Activities and Best Practices 6. Design and Development (A4): SDL Activities and Best Practices 7. Ship (A5): SDL Activities and Best Practices 8. Post-Release Support (PRSA1?5) 9. Adapting Our Reference Framework to Your Environment A. Case Study for Chapters 3 Through 8 Exercises B. Answers to Quick-Check Questions

        Détails de conformité du produit

        Consulter les détails de conformité de ce produit (

        Personne responsable dans l'UE

        )
        Le choixNeuf et occasion
        Minimum5% remboursés
        La sécuritéSatisfait ou remboursé
        Le service clientsÀ votre écoute
        LinkedinFacebookTwitterInstagramYoutubePinterestTiktok
        visavisa
        mastercardmastercard
        klarnaklarna
        paypalpaypal
        floafloa
        americanexpressamericanexpress
        Rakuten Logo
        • Rakuten Kobo
        • Rakuten TV
        • Rakuten Viber
        • Rakuten Viki
        • Plus de services
        • À propos de Rakuten
        Rakuten.com