Official (ISC)2 Guide to the CSSLP CBK ((ISC)2 Press)

3 avg rating
( 4 ratings by Goodreads )
 
9781466571273: Official (ISC)2 Guide to the CSSLP CBK ((ISC)2 Press)
View all copies of this ISBN edition:
 
 

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences―data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create.

Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2® Guide to the CSSLP® CBK®, Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure―both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more.

Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow.

"synopsis" may belong to another edition of this title.

List Price: US$ 100.95
US$ 93.97

Convert currency

Shipping: FREE
Within U.S.A.

Destination, rates & speeds

Add to Basket

Top Search Results from the AbeBooks Marketplace

1.

Paul, Mano
Published by Auerbach Publications (2013)
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Hardcover Quantity Available: 1
Seller:
Book Deals
(Lewiston, NY, U.S.A.)

Book Description Auerbach Publications, 2013. Hardcover. Condition: BRAND NEW. Seller Inventory # 1466571276_abe_bn

More information about this seller | Contact this seller

Buy New
US$ 93.97
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds

2.

Mano Paul
Published by Taylor & Francis Ltd, United Kingdom (2013)
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Hardcover Quantity Available: 1
Seller:
Book Depository International
(London, United Kingdom)

Book Description Taylor & Francis Ltd, United Kingdom, 2013. Hardback. Condition: New. 2nd New edition. Language: English. Brand new Book. Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences-data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create. Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2 (R) Guide to the CSSLP (R) CBK (R), Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure-both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more. Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow. Seller Inventory # AAZ9781466571273

More information about this seller | Contact this seller

Buy New
US$ 94.42
Convert currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, rates & speeds

3.

Paul, Mano
Published by Taylor Fransis
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Quantity Available: > 20
Seller:
INDOO
(Avenel, NJ, U.S.A.)

Book Description Taylor Fransis. Condition: New. Brand New. Seller Inventory # 1466571276

More information about this seller | Contact this seller

Buy New
US$ 90.89
Convert currency

Add to Basket

Shipping: US$ 3.60
Within U.S.A.
Destination, rates & speeds

4.

Mano Paul
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Hardcover Quantity Available: 1
Seller:
Grand Eagle Retail
(Wilmington, DE, U.S.A.)

Book Description 2013. Hardcover. Condition: New. 2nd. Hardcover. Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common applica.Shipping may be from multiple locations in the US or from the UK, depending on stock availability. 800 pages. 1.520. Seller Inventory # 9781466571273

More information about this seller | Contact this seller

Buy New
US$ 95.69
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds

5.

Mano Paul
Published by Taylor & Francis Ltd, United Kingdom (2013)
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Hardcover Quantity Available: 1
Seller:
The Book Depository
(London, United Kingdom)

Book Description Taylor & Francis Ltd, United Kingdom, 2013. Hardback. Condition: New. 2nd New edition. Language: English. Brand new Book. Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequences-data breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in software development and the new security threats they create. Recognized as one of the best application security tools available for professionals involved in software development, the Official (ISC)2 (R) Guide to the CSSLP (R) CBK (R), Second Edition, is both up-to-date and relevant, reflecting the latest developments in this ever-changing field and providing an intuitive approach to the CSSLP Common Body of Knowledge (CBK). It provides a robust and comprehensive study of the 8 domains of the CBK, covering everything from ensuring software security requirements are included in the software design phase to programming concepts that can effectively protect software from vulnerabilities to addressing issues pertaining to proper testing of software for security, and implementing industry standards and practices to provide a high level of assurance that the supply chain is secure-both up-stream. The book discusses the issues facing software professionals today, such as mobile app development, developing in the cloud, software supply chain risk management, and more. Numerous illustrated examples and practical exercises are included in this book to help the reader understand the concepts within the CBK and to enable them to apply these concepts in real-life situations. Endorsed by (ISC)2 and written and reviewed by CSSLPs and other (ISC)2 members, this book serves as an unrivaled study tool for the certification exam and an invaluable career reference. Earning your CSSLP is an esteemed achievement that validates your efforts in security leadership to help your organization build resilient software capable of combating the security threats of today and tomorrow. Seller Inventory # AAZ9781466571273

More information about this seller | Contact this seller

Buy New
US$ 97.03
Convert currency

Add to Basket

Shipping: FREE
From United Kingdom to U.S.A.
Destination, rates & speeds

6.

Paul, Mano
Published by Auerbach Publication
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Hardcover Quantity Available: 1
Print on Demand
Seller:

Book Description Auerbach Publication. Condition: BRAND NEW. BRAND NEW Hardcover - This title is now printed on demand - please allow added time for shipment! A Brand New Quality Book from a Full-Time Veteran Owned Bookshop in business since 1992!. Seller Inventory # 3511162

More information about this seller | Contact this seller

Buy New
US$ 97.90
Convert currency

Add to Basket

Shipping: FREE
Within U.S.A.
Destination, rates & speeds

7.

Mano Paul
Published by Auerbach Publications 2013-09-18 (2013)
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Quantity Available: 5
Seller:
Chiron Media
(Wallingford, United Kingdom)

Book Description Auerbach Publications 2013-09-18, 2013. Condition: New. Brand new book, sourced directly from publisher. Dispatch time is 3-4 working days from our warehouse. Book will be sent in robust, secure packaging to ensure it reaches you securely. Seller Inventory # NU-TNF-00003947

More information about this seller | Contact this seller

Buy New
US$ 92.13
Convert currency

Add to Basket

Shipping: US$ 11.99
From United Kingdom to U.S.A.
Destination, rates & speeds

8.

Mano Paul
Published by Auerbach Publications (2013)
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Hardcover Quantity Available: 1
Seller:
Irish Booksellers
(Portland, ME, U.S.A.)

Book Description Auerbach Publications, 2013. Condition: New. book. Seller Inventory # M1466571276

More information about this seller | Contact this seller

Buy New
US$ 99.52
Convert currency

Add to Basket

Shipping: US$ 4.77
Within U.S.A.
Destination, rates & speeds

9.

Mano Paul
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Quantity Available: 3
Seller:
Ria Christie Collections
(Uxbridge, United Kingdom)

Book Description Condition: New. Not Signed; Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have ap. book. Seller Inventory # ria9781466571273_rkm

More information about this seller | Contact this seller

Buy New
US$ 102.93
Convert currency

Add to Basket

Shipping: US$ 4.98
From United Kingdom to U.S.A.
Destination, rates & speeds

10.

Mano Paul
Published by Auerbach Publications 2013-09-18 (2013)
ISBN 10: 1466571276 ISBN 13: 9781466571273
New Quantity Available: 3
Seller:
Chiron Media
(Wallingford, United Kingdom)

Book Description Auerbach Publications 2013-09-18, 2013. Condition: New. Brand new book, sourced directly from publisher. Dispatch time is 24-48 hours from our warehouse. Book will be sent in robust, secure packaging to ensure it reaches you securely. Seller Inventory # NU-GRD-05029032

More information about this seller | Contact this seller

Buy New
US$ 96.51
Convert currency

Add to Basket

Shipping: US$ 11.99
From United Kingdom to U.S.A.
Destination, rates & speeds

There are more copies of this book

View all search results for this book