Official (ISC)2 Guide to the CSSLPAs the global leader in information security education and certification, (ISC)2 has a proven track record of educating and certifying information security professionals. Its newest certification, the Certified Secure Software Lifecycle Professional (CSSLP) is a testament to the organization's ongoing commitment to information and software security |
Contents
xvii | |
xix | |
xxi | |
25 | |
Secure Software Requirements | 79 |
Secure Software Design | 127 |
Secure Software ImplementationCoding | 233 |
Secure Software Testing | 323 |
Software Acceptance | 367 |
Software Deployment Operations Maintenance and Disposal | 403 |
Other editions - View all
Common terms and phrases
acceptance activities allowed analysis Answer application appropriate architecture assurance attacks audit authentication authorization availability certificates checks common complete computing confidentiality configuration covered cryptographic database defined detect determine devices disclosure documentation effective encryption ensure environment error evaluation example execute expected Figure functionality hash identify identity impact implementation important incident injection input integrity internal issues known languages layer logs means mechanisms memory ments mitigate monitoring object operations organization password patch performed phase prevent principle privilege protection Rationale/Answer Explanation referred request requirements result risk security requirements sensitive server session software development software security specific standard stored Table testing threat threat modeling tion trust validation verified vulnerabilities