|
|
|
|
LEADER |
03532nmm a2200721 u 4500 |
001 |
EB001912260 |
003 |
EBX01000000000000001075162 |
005 |
00000000000000.0 |
007 |
cr||||||||||||||||||||| |
008 |
210123 ||| eng |
020 |
|
|
|a 020172152X
|
020 |
|
|
|a 0672334062
|
020 |
|
|
|a 9781282680838
|
020 |
|
|
|a 9788131744635
|
020 |
|
|
|a 0672334097
|
020 |
|
|
|a 9780672334092
|
020 |
|
|
|a 0321624009
|
020 |
|
|
|a 1282680838
|
020 |
|
|
|a 9780672334061
|
020 |
|
|
|a 9780201721522
|
020 |
|
|
|a 9780321624000
|
050 |
|
4 |
|a QA76.76.D47
|
100 |
1 |
|
|a Viega, John
|
245 |
0 |
0 |
|a Building secure software
|b how to avoid security problems the right way
|c John Viega, Gary McGraw
|
260 |
|
|
|a Boston
|b Addison-Wesley
|c 2002
|
300 |
|
|
|a xxx, 493 pages
|b illustrations
|
505 |
0 |
|
|a Includes bibliographical references and index
|
653 |
|
|
|a Computer security
|
653 |
|
|
|a Computersicherheit / gnd
|
653 |
|
|
|a System design / nli
|
653 |
|
|
|a Computer software / Development / fast
|
653 |
|
|
|a System design / fast
|
653 |
|
|
|a Computer software / Development / nli
|
653 |
|
|
|a Computer security / blmlsh
|
653 |
|
|
|a System design / http://id.loc.gov/authorities/subjects/sh85131736
|
653 |
|
|
|a Conception de systèmes
|
653 |
|
|
|a Computer software / Development / blmlsh
|
653 |
|
|
|a Logiciels / eclas
|
653 |
|
|
|a Segurança de software / larpcal
|
653 |
|
|
|a Gestão da segurança em sistemas computacionais / larpcal
|
653 |
|
|
|a Computer Security
|
653 |
|
|
|a Sécurité informatique
|
653 |
|
|
|a Computer software / Development / http://id.loc.gov/authorities/subjects/sh85029535
|
653 |
|
|
|a Sécurité informatique / eclas
|
653 |
|
|
|a System design / blmlsh
|
653 |
|
|
|a Datenverarbeitung / gnd
|
653 |
|
|
|a Programmation informatique / eclas
|
653 |
|
|
|a Computer security / nli
|
653 |
|
|
|a Computer security / fast
|
653 |
|
|
|a Segurança de computadores / larpcal
|
700 |
1 |
|
|a McGraw, Gary
|
041 |
0 |
7 |
|a eng
|2 ISO 639-2
|
989 |
|
|
|b OREILLY
|a O'Reilly
|
490 |
0 |
|
|a Addison-Wesley professional computing series
|
500 |
|
|
|a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002
|
776 |
|
|
|z 9780321774958
|
776 |
|
|
|z 020172152X
|
776 |
|
|
|z 9780201721522
|
776 |
|
|
|z 0321774957
|
856 |
4 |
0 |
|u https://learning.oreilly.com/library/view/~/9780672334092/?ar
|x Verlag
|3 Volltext
|
082 |
0 |
|
|a 745.4
|
082 |
0 |
|
|a 005.1
|
520 |
|
|
|a "Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both security professionals who have come to realize that software is the problem, and software developers who intend to make their code behave. Written for anyone involved in software development and use--from managers to coders--this book is your first step toward building more secure software. Building Secure Software provides expert perspectives and techniques to help you ensure the security of essential software. If you consider threats and vulnerabilities early in the development cycle you can build security into your system. With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped"--Resource description page
|