MARC details
000 -LEADER |
fixed length control field |
03366cam a22003134i 4500 |
001 - CONTROL NUMBER |
control field |
0000066492 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
0001 |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150512s2014 flua b 001 0 eng |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781466560956 (hardback) |
040 ## - CATALOGING SOURCE |
Original cataloging agency |
DLC |
Language of cataloging |
eng |
Transcribing agency |
DLC |
Description conventions |
rda |
Modifying agency |
DLC |
042 ## - AUTHENTICATION CODE |
Authentication code |
pcc |
082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
Classification number |
005.8 |
Edition number |
23 |
084 ## - OTHER CLASSIFICATION NUMBER |
Classification number |
005.8 |
Item number |
RAN-C |
Number source |
bisacsh |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Ransome, James F. |
245 10 - TITLE STATEMENT |
Title |
Core software security : |
Medium |
[Book] : |
Remainder of title |
security at the source / |
Statement of responsibility, etc. |
James Ransome and Anmol Misra. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xxvi, 388 pages : |
Other physical details |
illustrations ; |
Dimensions |
24 cm. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
"This book outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. The authors focus on what humans can do to control and manage a secure software development process in the form of best practices and metrics. Although security issues will always exist, this book will teach you how to maximize an organizations ability to minimize vulnerabilities in your software products before they are released or deployed by building security into the development process. This book is targeted towards anyone who is interested in learning about software security in an enterprise environment to include product security and quality executives, software security architects, security consultants, software development engineers, enterprise SDLC program managers, chief information security officers, chief technology officers, and chief privacy officers whose companies develop software. If you want to learn about how software security should be implemented in developing enterprise software, this is a book you don't want to skip"-- |
Assigning source |
Provided by publisher. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
All. |
521 ## - TARGET AUDIENCE NOTE |
Target audience note |
All. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
COMPUTERS / Software Development & Engineering / General. |
Source of heading or term |
bisacsh. |
|
Topical term or geographic name entry element |
COMPUTERS / Security / General. |
Source of heading or term |
bisacsh. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
International relations. |
|
Topical term or geographic name entry element |
Postcolonialism. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Misra, Anmol. |
700 1# - ADDED ENTRY--PERSONAL NAME |
Personal name |
Darby, Phillip |
Fuller form of name |
(Phillip George Cavell) |
852 ## - LOCATION |
Piece designation |
50907 |
-- |
7543.69 |
Classification part |
005.8 RAN-C |
-- |
Multi-Line Books Lahore CUI Lahore |
Sublocation or collection |
Ground Floor |
Former shelving location |
Books |
Copy number |
1 |
Piece physical condition |
1-New |
Location |
JZL-CUI |
852 ## - LOCATION |
Piece designation |
54365 |
-- |
4501.63 |
Classification part |
327 FRO |
Sublocation or collection |
Ground Floor |
Former shelving location |
Books |
Copy number |
1 |
Piece physical condition |
1-New |
Location |
JZL-CUI |