Matches in Library of Congress for { <http://lccn.loc.gov/2012405842> ?p ?o. }
Showing items 1 to 24 of
24
with 100 items per page.
- 2012405842 alternative "Seven qualities of highly secure software".
- 2012405842 contributor B12576043.
- 2012405842 created "c2012.".
- 2012405842 date "2012".
- 2012405842 date "c2012.".
- 2012405842 dateCopyrighted "c2012.".
- 2012405842 description "Contents note continued: Step 4 Identify Applicable Controls -- Benefits of a Security Plan -- Mapped Software -- Conclusion -- References -- 3.Quality #3: Includes Foundational Assurance Elements -- Prelude: What Lies Beneath? -- Introduction -- Data: The New Frontier -- Data under Siege -- Foundational Assurance Elements -- Confidentiality -- Integrity -- Availability -- Authentication -- Authorization -- Auditing -- Conclusion -- References -- 4.Quality #4: Is Balanced -- Prelude: The Clown Fish and the Anemone -- Introduction -- Balancing Scale: Risk and Reward -- Balancing Scale: Functionality and Assurance -- Balancing Scale: Threats and Controls -- Conclusion -- References -- 5.Quality #5: Incorporates Security Requirements -- Prelude: Lost in Translation -- Introduction -- Types of Software Security Requirements -- Techniques to Elicit Software Security Requirements -- Traceability of Software Security Requirements -- Requirements to Retirement -- Conclusion --".
- 2012405842 description "Includes bibliographical references and index.".
- 2012405842 extent "xvi, 144 p. :".
- 2012405842 identifier "1439814465 (hardback)".
- 2012405842 identifier "9781439814468".
- 2012405842 issued "2012".
- 2012405842 issued "c2012.".
- 2012405842 language "eng".
- 2012405842 publisher "Boca Raton, FL : CRC Press,".
- 2012405842 subject "005.8 23".
- 2012405842 subject "Computer security.".
- 2012405842 subject "Computer software Development.".
- 2012405842 subject "QA76.76.D47 P3774 2012".
- 2012405842 subject "Software engineering.".
- 2012405842 tableOfContents "Contents note continued: Step 4 Identify Applicable Controls -- Benefits of a Security Plan -- Mapped Software -- Conclusion -- References -- 3.Quality #3: Includes Foundational Assurance Elements -- Prelude: What Lies Beneath? -- Introduction -- Data: The New Frontier -- Data under Siege -- Foundational Assurance Elements -- Confidentiality -- Integrity -- Availability -- Authentication -- Authorization -- Auditing -- Conclusion -- References -- 4.Quality #4: Is Balanced -- Prelude: The Clown Fish and the Anemone -- Introduction -- Balancing Scale: Risk and Reward -- Balancing Scale: Functionality and Assurance -- Balancing Scale: Threats and Controls -- Conclusion -- References -- 5.Quality #5: Incorporates Security Requirements -- Prelude: Lost in Translation -- Introduction -- Types of Software Security Requirements -- Techniques to Elicit Software Security Requirements -- Traceability of Software Security Requirements -- Requirements to Retirement -- Conclusion --".
- 2012405842 title "Seven qualities of highly secure software".
- 2012405842 title "The 7 qualities of highly secure software / Mano Paul.".
- 2012405842 type "text".