CSSLP Certification All-in-One Exam Guide
- Length: 824 pages
- Edition: 1
- Language: English
- Publisher: McGraw-Hill Osborne Media
- Publication Date: 2013-12-25
- ISBN-10: 0071760261
- ISBN-13: 9780071760263
- Sales Rank: #444005 (See Top 100 Books)
Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You’ll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.
COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL EXAM DOMAINS:
Secure software concepts
Secure software requirements
Secure software design
Secure software implementation/coding
Secure software testing
Software acceptance
Software deployment, operations, maintenance, and disposal
Supply chain and software acquisitions
ELECTRONIC CONTENT INCLUDES:
- TWO PRACTICE EXAMS
- PDF COPY OF THE BOOK
Table of Contents
Part I Secure Software Concepts
Chapter 1 General Security Concepts
Chapter 2 Risk Management
Chapter 3 Security Policies and Regulations
Chapter 4 Software Development Methodologies
Part II Secure Software Requirements
Chapter 5 Policy Decomposition
Chapter 6 Data Classification and Categorization
Chapter 7 Requirements
Part III Secure Software Design
Chapter 8 Design Processes
Chapter 9 Design Considerations
Chapter 10 Securing Commonly Used Architecture
Chapter 11 Technologies
Part IV Secure Software Implementation/Coding
Chapter 12 Common Software Vulnerabilities and Countermeasures
Chapter 13 Defensive Coding Practices
Chapter 14 Secure Software Coding Operations
Part V Secure Software Testing
Chapter 15 Security QualityAssurance Testing
Chapter 16 SecurityTesting
Part VI Secure Software Acceptance
Chapter 17 Secure Software Acceptance
Part VII Secure Software Installation, Deployment, Operations, Maintenance, and Disposal
Chapter 18 Secure Software Installation and Deployment
Chapter 19 Secure Software Operations and Maintenance
Chapter 20 Supply Chain and Software Acquisition