Cybersecurity : engineering a secure information technology organization / Dan Shoemaker, Ph. D., Center for Cyber Security and Intelligence Studies (CCIS), University of Detroit Mercy, Director of Global EdlCT, Kenneth Sigler, M.S., MS Computer Information Systems - Software Management, Computer Information Systems Faculty and Department Chair, Oakland Community College, Auburn Hills, Michigan.
Material type: TextPublication details: Stamford, CT : Cengage Learning, [2015], c2015.Description: xvii, 283 pages : illustrations ; 27 cmContent type:- text
- unmediated
- volume
- 9781285169903 (pbk.)
- 1285169905 (pbk.)
- QA76.9 A25Sh7 2015
Item type | Current library | Collection | Call number | Materials specified | Status | Notes | Date due | Barcode |
---|---|---|---|---|---|---|---|---|
Books | Ladislao N. Diwa Memorial Library Reserve Section | Non-fiction | RUS QA76.9 A25Sh7 2015 (Browse shelf(Opens below)) | Room use only | 76678 | 00076662 |
Browsing Ladislao N. Diwa Memorial Library shelves, Shelving location: Reserve Section, Collection: Non-fiction Close shelf browser (Hides shelf browser)
RUS QA76.8 W89 1992 PC configuration handbook : a complete guide to assembling, enhancing and maintaining your PC / | RUS QA76.9 A25H32 2010 IT security metrics : a practical framework for measuring security & protecting data / | RUS QA76.9 A25P48 1997 Security in computing / | RUS QA76.9 A25Sh7 2015 Cybersecurity : engineering a secure information technology organization / | RUS QA76.9 A43K67 2006 Algorithm design / | RUS QA76.9 A43P29 2022 Design and analysis of algorithms / | RUS QA76.9 A43Se2 2013 An Introduction to the analysis of algorithms / |
Includes glossary and index.
"Preparing tomorrow's information security professionals."--Front cover.
Lifecycle management -- The Agreement processes -- Organizational project-enabling processes -- Project processes -- Technical processes -- Software implementation process group -- Software supporting processes and software -- reuse -- Standard process models for securing ICT organizations -- The systems security engineering capability maturity model (ISO 21827) -- Software assurance maturity model -- The Building security in maturity model (BSIMM) -- Aligning the ICT organization with regulatory requirements -- GPS/CDU project for wild blue yonder technologies.
"Software is essential and pervasive in the modern world, but software acquisition, development, operation, and maintenance can invoice substantial risk, allowing attackers to compromise millions of computers every year. This groundbreaking text provides a uniquely comprehensive guide to software security, ranging far beyond secure coding to outline rigorous processes and practices for managing system and software lifecycle operations."--Back cover.
Fund 164 Forefront Book Co., Inc. Purchased 08/30/2018 76678 nej 4,400.00 2018-05-482 2018-1-0286