000 -LEADER |
fixed length control field |
02103nam a22003137a 4500 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20220904225819.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS |
fixed length control field |
a||||| |||| 00| 0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
ta |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
220210b ||||| |||| 00| 0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9781774074312 (e-book) |
040 ## - CATALOGING SOURCE |
Language of cataloging |
English. |
Transcribing agency |
CvSU-CCAT Campus Library. |
Description conventions |
rda. |
050 ## - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
EBOP TK 5105.59 |
Item number |
K38 2020 |
100 ## - MAIN ENTRY--PERSONAL NAME |
Personal name |
Kaul, Neha, author. |
9 (RLIN) |
4532 |
245 ## - TITLE STATEMENT |
Title |
Software Security : |
Remainder of title |
Building secure software applications / |
Statement of responsibility, etc. |
Neha Kaul. |
260 ## - PUBLICATION, DISTRIBUTION, ETC. |
Place of publication, distribution, etc. |
Ashland : |
Name of publisher, distributor, etc. |
Arcler Press, |
Date of publication, distribution, etc. |
c2020. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
xiii, 266 pages : |
Other physical details |
color illustrations |
336 ## - CONTENT TYPE |
Source |
rdacontent |
Content type term |
text |
Content type code |
txt |
337 ## - MEDIA TYPE |
Source |
rdamedia |
Media type term |
computer |
338 ## - CARRIER TYPE |
Source |
rdacarrier |
Carrier type term |
online resource |
500 ## - GENERAL NOTE |
Materials specified |
To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required). |
504 ## - BIBLIOGRAPHY, ETC. NOTE |
Bibliography, etc. note |
Includes bibliographical references and index. |
505 ## - FORMATTED CONTENTS NOTE |
Formatted contents note |
Chapter 1: Introduction and Evolution of Software<br/>Chapter 2: Importance of Security in Software<br/>Chapter 3: Risks of Software Use - Implications<br/>Chapter 4: Adding Security practices Within The Sdlc Lifecycle<br/>Chapter 5: Addition Security Guidelines<br/>Chapter 6: Existing Software Security Solutions / Frameworks |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Software Security: Building secure software applications discusses in detail the importance of security in software, and the vulnerability associated with the use of software. Considering the latest developments in technology, the book presents a detailed overview of guidelines and techniques to build secure software applications. It further explains the known security concerns, and how the same can be overcome. Towards the end, a chapter is dedicated to the techniques related to software testing and auditing. |
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE |
Accession number |
EBOP00002 |
Extent |
1 |
546 ## - LANGUAGE NOTE |
Materials specified |
In English text. |
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
9 (RLIN) |
2585 |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Electronic name |
Bibliotex. |
Materials specified |
Electronic Resources |
Public note |
<a href="https://www.bibliotex.com/pdfreader/software-security-building-secure-applications">https://www.bibliotex.com/pdfreader/software-security-building-secure-applications</a> |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
|
Koha item type |
E-Books |
Classification part |
TK 5105.59 K38 2020 |
Call number prefix |
EBOP |