[Ronald L Krutz; Alexander J Fry] — The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional exam The CSSLP (Certified. [Matching item] The CSSLP prep guide [electronic resource]: mastering the Certified Secure Software Lifecycle Professional / Ronald L Krutz, Alexander J. Fry. Synopsis: The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional exam. The CSSLP (Certified Secure Software Lifecycle.
|Published (Last):||14 August 2014|
|PDF File Size:||9.40 Mb|
|ePub File Size:||2.84 Mb|
|Price:||Free* [*Free Regsitration Required]|
Authentication, Authorization, Auditing, and Accountability 1. Biba Integrity Model 1. You may send this item to up to five recipients. The E-mail Address es you entered is are not in a valid format. Appendix B Glossary of Terms and Acronyms. Testing for Failure 5. Chapter 1 Secure Software Concepts. Chapter 2 Secure Software Requirements. Privacy-Related Legislation and Guidelines 1.
Definitions and Procedures 6. Determining Recovery Time Objectives 6. Remember cssslp on this computer. Support Tool Evaluation 4. Authentication and Identification 2. Privileged Entity Protection 7.
The CSSLP™ Prep Guide: Mastering the Certified Secure Software Lifecycle Professional
FIPS Certification 6. Your list has reached the maximum number of items. Trusted Platform Modules 1. If you’re an IT professional, security professional, software developer, project manager, software assurance tester, executive manager or employee of a government agency in a related field, your career may benefit from this certification.
Deny Attackers the Means to Guixe 3. Separation of Duties 1.
The CSSLP prep guide : mastering the Certified Secure Software Lifecycle Professional
Identification of Data and Gathering of Threat Information 2. Document, Internet resource Document Type: Categories of Operations Controls 7. Microsoft Software Development Baseline Process 1.
Patch Management Phases 7.
Media Security Controls 7. Code Analysis in the SDL 4. Scope and Plan Initiation 6.
Computer Security and Incident Response Teams 7. Additional Software Acquisition Assurance Issues 1. Section Compliance 6.
Principle of Separation of Domains 3. Mapping the Network 5. Your request to send this item has been completed.
Secure Software Design 3. Static Code Analysis 4. Stay ahead with the world’s most comprehensive technology and business learning platform. Trusted Platform Module 7.
The CSSLP Prep Guide
Identifying Active Machines 5. Security Management Interfaces 3. Election Assistance Commission Certification 6.
Simulation and Data 5. Legal and Ethical Implications 5.
Health Care—Related Privacy Issues 1. Simplify the Design 3. Typical Threats and Attacks 5.
Code Access Security 4. Some features of WorldCat will not be available. Software Disaster Recovery Plan 6. Design for Secure Failure 3. Write a review Rate this item: Segregate Trusted Entities from Untrusted Entities 3.
Dynamic Analysis Tools 4. Security Design Patterns 3. Avoid Timing, Synchronization, and Sequencing Issues 3. Chapter 3 Secure Software Design.