0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (3)
  • R2,500 - R5,000 (4)
  • R5,000 - R10,000 (1)
  • -
Status
Brand

Showing 1 - 8 of 8 matches in All Departments

Practical Core Software Security - A Reference Framework (Paperback): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Paperback)
James F Ransome, Anmol Misra, Mark S. Merkow
R2,301 Discovery Miles 23 010 Ships in 9 - 15 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Practical Core Software Security - A Reference Framework (Hardcover): James F Ransome, Anmol Misra, Mark S. Merkow Practical Core Software Security - A Reference Framework (Hardcover)
James F Ransome, Anmol Misra, Mark S. Merkow
R5,499 Discovery Miles 54 990 Ships in 12 - 17 working days

As long as humans write software, the key to successful software security is making the software development program process more efficient and effective. Although the approach of this textbook includes people, process, and technology approaches to software security, Practical Core Software Security: A Reference Framework stresses the people element of software security, which is still the most important part to manage as software is developed, controlled, and exploited by humans. The text outlines a step-by-step process for software security that is relevant to today's technical, operational, business, and development environments. It focuses on what humans can do to control and manage a secure software development process using best practices and metrics. Although security issues will always exist, students learn how to maximize an organization's ability to minimize vulnerabilities in software products before they are released or deployed by building security into the development process. The authors have worked with Fortune 500 companies and have often seen examples of the breakdown of security development lifecycle (SDL) practices. The text takes an experience-based approach to apply components of the best available SDL models in dealing with the problems described above. Software security best practices, an SDL model, and framework are presented in this book. Starting with an overview of the SDL, the text outlines a model for mapping SDL best practices to the software development life cycle (SDLC). It explains how to use this model to build and manage a mature SDL program. Exercises and an in-depth case study aid students in mastering the SDL model. Professionals skilled in secure software development and related tasks are in tremendous demand today. The industry continues to experience exponential demand that should continue to grow for the foreseeable future. This book can benefit professionals as much as students. As they integrate the book's ideas into their software security practices, their value increases to their organizations, management teams, community, and industry.

Cloud Computing - Implementation, Management, and Security (Hardcover): John W Rittinghouse, James F Ransome Cloud Computing - Implementation, Management, and Security (Hardcover)
John W Rittinghouse, James F Ransome
R2,655 Discovery Miles 26 550 Ships in 12 - 17 working days

Cloud Computing: Implementation, Management, and Security provides an understanding of what cloud computing really means, explores how disruptive it may become in the future, and examines its advantages and disadvantages. It gives business executives the knowledge necessary to make informed, educated decisions regarding cloud initiatives.

The authors first discuss the evolution of computing from a historical perspective, focusing primarily on advances that led to the development of cloud computing. They then survey some of the critical components that are necessary to make the cloud computing paradigm feasible. They also present various standards based on the use and implementation issues surrounding cloud computing and describe the infrastructure management that is maintained by cloud computing service providers. After addressing significant legal and philosophical issues, the book concludes with a hard look at successful cloud computing vendors.

Helping to overcome the lack of understanding currently preventing even faster adoption of cloud computing, this book arms readers with guidance essential to make smart, strategic decisions on cloud initiatives.

Wireless Security: Know It All (Paperback): Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A.... Wireless Security: Know It All (Paperback)
Praphul Chandra, Alan Bensky, Tony Bradley, CISSP, MCSE, Chris Hurley, Steve A. Rackley, …
R1,662 Discovery Miles 16 620 Ships in 12 - 17 working days

The Newnes Know It All Series takes the best of what our authors have written to create hard-working desk references that will be an engineer's first port of call for key information, design techniques and rules of thumb. Guaranteed not to gather dust on a shelf
Communications engineers need to master a wide area of topics to excel. The "Wireless Security Know It All" covers every angle including Emerging Wireless Technologies and Security Issues, Wireless LAN and MAN Security, as well as Wireless Personal Area Networks.
A 360-degree view from our best-selling authors
Topics include Today s Wireless Technology, Security Definitions and Concepts, and Wireless Handheld devices
The ultimate hard-working desk reference; all the essential information, techniques and tricks of the trade in one volume"

Business Continuity and Disaster Recovery for InfoSec Managers (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD,... Business Continuity and Disaster Recovery for InfoSec Managers (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,590 Discovery Miles 25 900 Ships in 10 - 15 working days

Every year, nearly one in five businesses suffers a major disruption to its data or voice networks or
communications systems. Since 9/11 it has become increasingly important for companies to implement a
plan for disaster recovery. This comprehensive book addresses the operational and day-to-day security
management requirements of business stability and disaster recovery planning specifically tailored for the needs and requirements of an Information Security Officer.
This book has been written by battle tested security consultants who have based all the material, processes and problem- solving on real-world planning and recovery events in enterprise environments world wide.
John has over 25 years experience in the IT and security sector. He is an often sought management consultant for large enterprise and is currently a member of the Federal Communication Commission's Homeland Security Network Reliability and Interoperability Council Focus Group on Cybersecurity, working in the Voice over Internet Protocol workgroup.
James has over 30 years experience in security operations and technology assessment as a corporate security executive and positions within the intelligence, DoD, and federal law enforcement communities. He has a Ph.D. in information systems specializing in information security and is a member of Upsilon Pi Epsilon (UPE), the International Honor Society for the Computing and Information Disciplines. He is currently an Independent Consultant.
.Provides critical strategies for maintaining basic business functions when and if systems are shut down
.Establishes up to date methods and techniques for maintaining second site back up and recovery
.Gives managers viable and efficient processes that meet new government rules for saving and protecting data in the event of disasters"

IM Instant Messaging Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP IM Instant Messaging Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R2,763 Discovery Miles 27 630 Ships in 10 - 15 working days

BRIEF DESCRIPTION OF CONTENT:
There is a significant need for a comprehensive book addressing the operational and day-to-day security management requirements. IM, used in enterprise networks can easily be reconfigured and allow for potentially nonstop exposure; they require the level of security be scrutinized carefully. This includes inherent security flaws in various network architectures that result in additional risks to otherwise secure converged networks. A few books cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security, but none of them address IM issues in a manner that is useful for the day-to-day operations and management of enterprise networks. IM Security is intended to bridge this gap.

UNIQUE FEATURE/RATIONALE
There are no current books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for IM security. No book we know of addresses IM security in a manner useful for day-to-day operations and management of IM-capable networks in today s corporate environment.
* Up-to-date coverage of architecture, design, theory, issues, challenges, and recommended policies for IM security.
* Addresses IM security for day-to-day operations and management of IM-capable networks in today s corporate environment"

Voice over Internet Protocol (VoIP) Security (Paperback, New): James F. Ransome, PhD, CISM, CISSP, John Rittinghouse Phd Cism Voice over Internet Protocol (VoIP) Security (Paperback, New)
James F. Ransome, PhD, CISM, CISSP, John Rittinghouse Phd Cism
R2,369 Discovery Miles 23 690 Ships in 10 - 15 working days

Voice Over Internet Protocol Security has been designed to help the reader fully understand, prepare for and mediate current security and QoS risks in today s complex and ever changing converged network environment and it will help you secure your VoIP network whether you are at the planning, implementation, or post-implementation phase of your VoIP infrastructure.
* This book will teach you how to plan for and implement VoIP security solutions in converged network infrastructures. Whether you have picked up this book out of curiosity or professional interest . . . it is not too late to read this book and gain a deep understanding of what needs to be done in a VoIP implementation.
* In the rush to be first to market or to implement the latest and greatest technology, many current implementations of VoIP infrastructures, both large and small, have been implemented with minimal thought to QoS and almost no thought to security and interoperability.

Wireless Operational Security (Paperback): John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP Wireless Operational Security (Paperback)
John Rittinghouse Phd Cism, James F. Ransome, PhD, CISM, CISSP
R3,070 Discovery Miles 30 700 Ships in 10 - 15 working days

This comprehensive wireless network book addresses the operational and day-to-day security management requirements of 21st century companies. Wireless networks can easily be reconfigured, are very mobile, allow for potentially nonstop exposure, and require the level of security be scrutinized even more than for wired networks. This includes inherent security flaws in various wireless architectures that result in additional risks to otherwise secure converged wired networks. An even worse scenario is one where an insecure wireless network is connected to a weakly secured or insecure wired network and the wireless subnet is not separated from the wired subnet. There are approximately a dozen popular books that cover components of the architecture, design, theory, issues, challenges, and recommended policies for wireless security, none of which address them in a practical, operationally-oriented and comprehensive way. Wireless Operational Security bridges this gap.
*Presents a new "WISDOM" model for Wireless Security Infrastructures
*Acts as a critical guide to implementing "Converged Networks" wired/wireless with all necessary security considerations
*Rittinghouse's Cybersecurity Operations Handbook is the only security book recommended by the FCC

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Cutlery Organizer (Transparent)
R599 R199 Discovery Miles 1 990
Spectra S1 Double Rechargeable Breast…
 (46)
R3,899 R3,679 Discovery Miles 36 790
Gynaguard Ultimate Wash (250ml)
R120 R111 Discovery Miles 1 110
Cristiano Ronaldo CR7 Gift Set…
R928 R469 Discovery Miles 4 690
Too Beautiful To Break
Tessa Bailey Paperback R280 R224 Discovery Miles 2 240
Pamper Fine Cuts in Jelly - Gourmet Meat…
R12 R11 Discovery Miles 110
Cadac Handi Lite Gas Lamp
R599 R295 Discovery Miles 2 950
Tommee Tippee Sports Bottle 300ml - Free…
R81 Discovery Miles 810
Jurassic Park Trilogy Collection
Sam Neill, Laura Dern, … Blu-ray disc  (1)
R311 Discovery Miles 3 110
Lucky Lubricating Clipper Oil (100ml)
R69 R29 Discovery Miles 290

 

Partners