4 results (0,13675 seconds)

Brand

Merchant

Price (EUR)

Reset filter

Products
From
Shops

Core Software Security Security at the Source

Core Software Security Security at the Source

. an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. . Readers are armed with firm solutions for the fight against cyber threats. —Dr. Dena Haritos Tsamitis. Carnegie Mellon University. a must read for security specialists software developers and software engineers. . should be part of every security professional’s library. —Dr. Larry Ponemon Ponemon Institute. the definitive how-to guide for software security professionals. Dr. Ransome Anmol Misra and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. . A must-have for anyone on the front lines of the Cyber War . —Cedric Leighton Colonel USAF (Ret. ) Cedric Leighton AssociatesDr. Ransome Anmol Misra and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source! —Eric S. Yuan Zoom Video CommunicationsThere is much publicity regarding network security but the real cyber Achilles’ heel is insecure software. Millions of software vulnerabilities create a cyber house of cards in which we conduct our digital lives. In response security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative innovative people who write software. Core Software Security expounds developer-centric software security a holistic process to engage creativity for security. As long as software is developed by humans it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development which lies at the heart of our cyber infrastructure. Whatever development method is employed software must be secured at the source. Book Highlights: Supplies a practitioner's view of the SDL Considers Agile as a security enabler Covers the privacy elements in an SDL Outlines a holistic business-savvy SDL framework that includes people process and technology Highlights the key success factors deliverables and metrics for each phase of the SDL Examines cost efficiencies optimized performance and organizational structure of a developer-centric software security program and PSIRT Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the book’s SDL framework View the authors' website at http://www. androidinsecurity. com/ | Core Software Security Security at the Source

GBP 44.99
1

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

Most academics still wrestle with the publish or perish phenomenon. Based on Dr. Liebowitz’s 25 years serving as the editor-in-chief of a leading international journal along with insights from some of the most knowledgeable journal editors this book shares key lessons learned to help new professors doctoral students and practitioner–scholars increase their chances of being published in selective refereed international journals. It focuses on the key practices needed to ensure journal publication with interesting cases and helpful tips sprinkled throughout the book. A Guide to Publishing for Academics provides useful knowledge from leading journal editors of both traditional and online journals as well as various tiers of journals. Although the focus is mainly in the business and IT areas much of the guidance provided can cross into other fields. The book contains interesting vignettes and do’s and don’ts so that potential authors can understand what goes on behind the scenes once the manuscript arrives on the journal editor’s desk. The book provides constructive guidance on choosing what and where to publish what to consider when writing a title for a paper how to prepare and submit journal manuscripts and how to position a paper for publication. It also has valuable information for current and future journal editors including models of editing and editorial boards editorial coaching advice and editing smart practices. With the information in this book the next generation of academics and practitioner–scholars will be well equipped to overcome the publish or perish phenomenon. | A Guide to Publishing for Academics Inside the Publish or Perish Phenomenon

GBP 56.99
1

Project Management beyond Waterfall and Agile

Project Management beyond Waterfall and Agile

This book goes beyond the paint by numbers approach transcending the how of project management to the what and why which is critical for leaders of change. — Dr. Joel B. Carboni President and Founder GPM Global and President IPMA-USAProject Management beyond Waterfall and Agile presents a flexible universal and integrated three-dimensional model for managing projects the Customizable and Adaptable Methodology for Managing Projects™ (CAMMP™ ). By tailoring and customizing the model to a specific industry or organization and by adapting it to a function or project classification this model can be used to manage any project. CAMMP™ can also be used both in a traditional or an Agile environment. CAMMP™ integrates leading concepts on competence processes and sustainability. The model’s three dimensions are project lifecycle project management processes and finally competence sustainability and best practices. The book explains how to integrate these dimensions to manage a project across the three dimensions and the project stages. CAMMP™ is a stage-gate process which is vital for project success. The current state of practice in project management is not sustainable. The root causes of this problem include a lack of standardized processes missing methods or methodological approaches and no real organizational system for managing projects. This book introduces a system to address these shortcomings. It focuses on the elements of this system which is a practical and systematic methodological approach for managing and delivering all types of projects. CAMMP™ integrates the best learning from the various global associations in the field. The book distills the experience and knowledge of a practitioner working in different roles for more than three decades on various types of projects of all sizes and complexities. It is a practical book by a practitioner writing for practitioners.

GBP 44.99
1

Building in Security at Agile Speed

Building in Security at Agile Speed

Today's high-speed and rapidly changing development environments demand equally high-speed security practices. Still achieving security remains a human endeavor a core part of designing generating and verifying software. Dr. James Ransome and Brook S. E. Schoenfield have built upon their previous works to explain that security starts with people; ultimately humans generate software security. People collectively act through a particular and distinct set of methodologies processes and technologies that the authors have brought together into a newly designed holistic generic software development lifecycle facilitating software security at Agile DevOps speed. —Eric. S. Yuan Founder and CEO Zoom Video Communications Inc. It is essential that we embrace a mantra that ensures security is baked in throughout any development process. Ransome and Schoenfield leverage their abundance of experience and knowledge to clearly define why and how we need to build this new model around an understanding that the human element is the ultimate key to success. —Jennifer Sunshine Steffens CEO of IOActive Both practical and strategic Building in Security at Agile Speed is an invaluable resource for change leaders committed to building secure software solutions in a world characterized by increasing threats and uncertainty. Ransome and Schoenfield brilliantly demonstrate why creating robust software is a result of not only technical but deeply human elements of agile ways of working. —Jorgen Hesselberg author of Unlocking Agility and Cofounder of Comparative Agility The proliferation of open source components and distributed software services makes the principles detailed in Building in Security at Agile Speed more relevant than ever. Incorporating the principles and detailed guidance in this book into your SDLC is a must for all software developers and IT organizations. —George K Tsantes CEO of Cyberphos former partner at Accenture and Principal at EYDetailing the people processes and technical aspects of software security Building in Security at Agile Speed emphasizes that the people element remains critical because software is developed managed and exploited by humans. This book presents a step-by-step process for software security that uses today’s technology operational business and development methods with a focus on best practice proven activities processes tools and metrics for any size or type of organization and development practice.

GBP 44.99
1