9781285169903-1285169905-Cybersecurity: Engineering a Secure Information Technology Organization

Cybersecurity: Engineering a Secure Information Technology Organization

ISBN-13: 9781285169903
ISBN-10: 1285169905
Edition: 1
Author: Dan Shoemaker, Kenneth Sigler
Publication date: 2014
Publisher: Cengage Learning
Format: Paperback 512 pages
FREE US shipping
Buy

From $50.99

Book details

ISBN-13: 9781285169903
ISBN-10: 1285169905
Edition: 1
Author: Dan Shoemaker, Kenneth Sigler
Publication date: 2014
Publisher: Cengage Learning
Format: Paperback 512 pages

Summary

Cybersecurity: Engineering a Secure Information Technology Organization (ISBN-13: 9781285169903 and ISBN-10: 1285169905), written by authors Dan Shoemaker, Kenneth Sigler, was published by Cengage Learning in 2014. With an overall rating of 4.3 stars, it's a notable title among other Network Security (Security & Encryption, Networking & Cloud Computing) books. You can easily purchase or rent Cybersecurity: Engineering a Secure Information Technology Organization (Paperback) from BooksRun, along with many other new and used Network Security books and textbooks. And, if you're looking to sell your copy, our current buyback offer is $0.6.

Description

Software is essential and pervasive in the modern world, but software acquisition, development, operation, and maintenance can involve substantial risk, allowing attackers to compromise millions of computers every year. This groundbreaking book provides a uniquely comprehensive guide to software security, ranging far beyond secure coding to outline rigorous processes and practices for managing system and software lifecycle operations. The book opens with a comprehensive guide to the software lifecycle, covering all elements, activities, and practices encompassed by the universally accepted ISO/IEEE 12207-2008 standard. The authors then proceed document proven management architecture and process framework models for software assurance, such as ISO 21827 (SSE-CMM), CERT-RMM, the Software Assurance Maturity Model, and NIST 800-53. Within these models, the authors present standards and practices related to key activities such as threat and risk evaluation, assurance cases, and adversarial testing. Ideal for new and experienced cybersecurity professionals alike in both the public and private sectors, this one-of-a-kind book prepares readers to create and manage coherent, practical, cost-effective operations to ensure defect-free systems and software.

Rate this book Rate this book

We would LOVE it if you could help us and other readers by reviewing the book