- ホーム
- > 洋書
- > 英文書
- > Computer / General
Full Description
Publisher's Noteguaranteed by the publisher for quality, authenticity, or access to any online entitlements included with the product.Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional examCSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFE CYCLE PROFESSIONAL EXAM DOMAINS:Secure software conceptsSecure software requirementsSecure software designSecure software implementation/codingSecure software testingSoftware acceptanceSoftware deployment, operations, maintenance, and disposalSupply chain and software acquisitionsELECTRONIC CONTENT INCLUDES:TWO PRACTICE EXAMS
Contents
Part IChapter 1: Security ConceptsChapter 2: Risk ManagementChapter 3: Security Policies and RegulationsChapter 4: Software Development MethodologiesPart II: Secure Software RequirementsChapter 5: Policy DecompositionChapter 6: Data Classification and CategorizationChapter 7: RequirementsPart III: Secure Software DesignChapter 8: Design ProcessesChapter 9: Design ConsiderationsChapter 10: Securing Commonly Used ArchitectureChapter 11: TechnologiesPart IV: Secure Software Implementation/CodingChapter 12: Common Software Vulnerabilities and CountermeasuresChapter 13: Defensive Coding PracticesChapter 14: Secure Software Coding OperationsPart V: Secure Software TestingChapter 15: Secure Quality Assurance TestingChapter 16: Security Test TypesPart VI: Secure Software AcceptanceChapter 17: Secure Software AcceptancePart VII: Secure Software Installation, Deployment, Operations, Maintenance, and DisposalChapter 18: Secure Software Installation and DeploymentChapter 19: Secure Software Operations and MaintenanceChapter 20: Supply Chain and Software AcquisitionsPart VIII: AppendicesAppendix A: About the CDGlossaryNER(01): WOW