Software Security : (Record no. 1511)

000 -LEADER
fixed length control field 02103nam a22003137a 4500
005 - DATE AND TIME OF LATEST TRANSACTION
control field 20220904225819.0
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS
fixed length control field a||||| |||| 00| 0
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION
fixed length control field ta
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION
fixed length control field 220210b ||||| |||| 00| 0 eng d
020 ## - INTERNATIONAL STANDARD BOOK NUMBER
International Standard Book Number 9781774074312 (e-book)
040 ## - CATALOGING SOURCE
Language of cataloging English.
Transcribing agency CvSU-CCAT Campus Library.
Description conventions rda.
050 ## - LIBRARY OF CONGRESS CALL NUMBER
Classification number EBOP TK 5105.59
Item number K38 2020
100 ## - MAIN ENTRY--PERSONAL NAME
Personal name Kaul, Neha, author.
9 (RLIN) 4532
245 ## - TITLE STATEMENT
Title Software Security :
Remainder of title Building secure software applications /
Statement of responsibility, etc. Neha Kaul.
260 ## - PUBLICATION, DISTRIBUTION, ETC.
Place of publication, distribution, etc. Ashland :
Name of publisher, distributor, etc. Arcler Press,
Date of publication, distribution, etc. c2020.
300 ## - PHYSICAL DESCRIPTION
Extent xiii, 266 pages :
Other physical details color illustrations
336 ## - CONTENT TYPE
Source rdacontent
Content type term text
Content type code txt
337 ## - MEDIA TYPE
Source rdamedia
Media type term computer
338 ## - CARRIER TYPE
Source rdacarrier
Carrier type term online resource
500 ## - GENERAL NOTE
Materials specified To access the E-Book : https://www.bibliotex.com/ (Log-in/Register is required).
504 ## - BIBLIOGRAPHY, ETC. NOTE
Bibliography, etc. note Includes bibliographical references and index.
505 ## - FORMATTED CONTENTS NOTE
Formatted contents note Chapter 1: Introduction and Evolution of Software<br/>Chapter 2: Importance of Security in Software<br/>Chapter 3: Risks of Software Use - Implications<br/>Chapter 4: Adding Security practices Within The Sdlc Lifecycle<br/>Chapter 5: Addition Security Guidelines<br/>Chapter 6: Existing Software Security Solutions / Frameworks
520 ## - SUMMARY, ETC.
Summary, etc. Software Security: Building secure software applications discusses in detail the importance of security in software, and the vulnerability associated with the use of software. Considering the latest developments in technology, the book presents a detailed overview of guidelines and techniques to build secure software applications. It further explains the known security concerns, and how the same can be overcome. Towards the end, a chapter is dedicated to the techniques related to software testing and auditing.
541 ## - IMMEDIATE SOURCE OF ACQUISITION NOTE
Accession number EBOP00002
Extent 1
546 ## - LANGUAGE NOTE
Materials specified In English text.
650 ## - SUBJECT ADDED ENTRY--TOPICAL TERM
Topical term or geographic name entry element Computer security.
9 (RLIN) 2585
856 40 - ELECTRONIC LOCATION AND ACCESS
Electronic name Bibliotex.
Materials specified Electronic Resources
Public note <a href="https://www.bibliotex.com/pdfreader/software-security-building-secure-applications">https://www.bibliotex.com/pdfreader/software-security-building-secure-applications</a>
942 ## - ADDED ENTRY ELEMENTS (KOHA)
Source of classification or shelving scheme
Koha item type E-Books
Classification part TK 5105.59 K38 2020
Call number prefix EBOP
Holdings
Withdrawn status Lost status Source of classification or shelving scheme Damaged status Not for loan Collection code Permanent location Current location Shelving location Date acquired Source of acquisition Coded location qualifier Cost, normal purchase price Full call number Barcode Date last seen Copy number Price effective from Koha item type
          Electronic Resources Cavite State University - CCAT Campus Cavite State University - CCAT Campus ER 02/06/2022 Purchased EBOP 5990.00 EBOP TK 5105.59 K38 2020 EBOP0000002 02/10/2022 1 copy 02/06/2022 E-Books

Powered by Koha