CSSLP Certification All-in-One Exam Guide - Wm. Arthur Conklin, Daniel Shoemaker

CSSLP Certification All-in-One Exam Guide

Buch
824 Seiten
2014
McGraw-Hill Professional (Verlag)
978-0-07-176026-3 (ISBN)
49,85 inkl. MwSt
zur Neuauflage
  • Titel erscheint in neuer Auflage
  • Artikel merken
Zu diesem Artikel existiert eine Nachauflage
Leading IT security experts fully cover CSSLP—the secure software certification exam from (ISC)2
Publisher's Note: Products purchased from Third Party sellers are not guaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.

Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam

CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.

COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFE CYCLE PROFESSIONAL EXAM DOMAINS:

Secure software concepts
Secure software requirements
Secure software design
Secure software implementation/coding
Secure software testing
Software acceptance
Software deployment, operations, maintenance, and disposal
Supply chain and software acquisitions

ELECTRONIC CONTENT INCLUDES:



TWO PRACTICE EXAMS
PDF COPY OF THE BOOK

Wm. Arthur Conklin (Houston, TX), Security+, CISSP, is an Assistant Professor in the Information and Logistics Technology department at the University of Houston. In addition to his PhD, Mr. Conklin has a MBA from UTSA, and two graduate degrees in Electrical Engineering from the Naval Postgraduate School in Monterey, California. Dr. Conklins interests are information security, systems theory, and secure software design. Dan Shoemaker, Ph. D. (University of Detroit Mercy) is the Director of the Centre for the Software Assurance Institute, a National Security Agency (NSA) Center of Academic Excellence, at the University of Detroit Mercy. He is also a Professor at UDM where he has been the Chair of Computer and Information Systems since 1985. Dr. Shoemaker is Co-Chair of the Workforce Training and Education working group within the Department of Homeland Securitys National Cybersecurity Division (NCSD). Dr. Shoemaker was one of the earliest academic participants in the development of Software Engineering as a discipline, starting at SEI in the fall of 1987.

Part I: Secure Software Concepts
Chapter 1: Security Concepts
Chapter 2: Risk Management
Chapter 3: Security Policies and Regulations
Chapter 4: Software Development Methodologies
Part II: Secure Software Requirements
Chapter 5: Policy Decomposition
Chapter 6: Data Classification and Categorization
Chapter 7: Requirements
Part III: Secure Software Design
Chapter 8: Design Processes
Chapter 9: Design Considerations
Chapter 10: Securing Commonly Used Architecture
Chapter 11: Technologies
Part IV: Secure Software Implementation/Coding
Chapter 12: Common Software Vulnerabilities and Countermeasures
Chapter 13: Defensive Coding Practices
Chapter 14: Secure Software Coding Operations
Part V: Secure Software Testing
Chapter 15: Secure Quality Assurance Testing
Chapter 16: Security Test Types
Part VI: Secure Software Acceptance
Chapter 17: Secure Software Acceptance
Part VII: Secure Software Installation, Deployment, Operations, Maintenance, and Disposal
Chapter 18: Secure Software Installation and Deployment
Chapter 19: Secure Software Operations and Maintenance
Chapter 20: Supply Chain and Software Acquisitions
Part VIII: Appendices
Appendix A: About the CD
Glossary

Erscheint lt. Verlag 16.4.2014
Reihe/Serie All-in-One
Zusatzinfo 160 Illustrations, unspecified
Sprache englisch
Maße 193 x 239 mm
Gewicht 1084 g
Themenwelt Informatik Netzwerke Sicherheit / Firewall
Mathematik / Informatik Informatik Software Entwicklung
Mathematik / Informatik Informatik Theorie / Studium
Informatik Weitere Themen Zertifizierung
Schlagworte Netzwerksicherheit
ISBN-10 0-07-176026-1 / 0071760261
ISBN-13 978-0-07-176026-3 / 9780071760263
Zustand Neuware
Haben Sie eine Frage zum Produkt?
Mehr entdecken
aus dem Bereich
Konzepte – Verfahren – Protokolle

von Claudia Eckert

Buch | Hardcover (2023)
De Gruyter Oldenbourg (Verlag)
84,95