|
Showing 1 - 14 of
14 matches in All Departments
Today's high-speed and rapidly changing development environments
demand equally high-speed security practices. Still, achieving
security remains a human endeavor, a core part of designing,
generating and verifying software. Dr. James Ransome and Brook S.E.
Schoenfield have built upon their previous works to explain that
security starts with people; ultimately, humans generate software
security. People collectively act through a particular and distinct
set of methodologies, processes, and technologies that the authors
have brought together into a newly designed, holistic, generic
software development lifecycle facilitating software security at
Agile, DevOps speed. —Eric. S. Yuan, Founder and CEO, Zoom Video
Communications, Inc. It is essential that we embrace a mantra that
ensures security is baked in throughout any development process.
Ransome and Schoenfield leverage their abundance of experience and
knowledge to clearly define why and how we need to build this new
model around an understanding that the human element is the
ultimate key to success. —Jennifer Sunshine Steffens, CEO of
IOActive Both practical and strategic, Building in Security at
Agile Speed is an invaluable resource for change leaders committed
to building secure software solutions in a world characterized by
increasing threats and uncertainty. Ransome and Schoenfield
brilliantly demonstrate why creating robust software is a result of
not only technical, but deeply human elements of agile ways of
working. —Jorgen Hesselberg, author of Unlocking Agility and
Cofounder of Comparative Agility The proliferation of open source
components and distributed software services makes the principles
detailed in Building in Security at Agile Speed more relevant than
ever. Incorporating the principles and detailed guidance in this
book into your SDLC is a must for all software developers and IT
organizations. —George K Tsantes, CEO of Cyberphos, former
partner at Accenture and Principal at EY Detailing the people,
processes, and technical aspects of software security, Building in
Security at Agile Speed emphasizes that the people element remains
critical because software is developed, managed, and exploited by
humans. This book presents a step-by-step process for software
security that uses today’s technology, operational, business, and
development methods with a focus on best practice, proven
activities, processes, tools, and metrics for any size or type of
organization and development practice.
Cybersecurity risk is a top-of-the-house issue for all
organizations. Cybertax-Managing the Risks and Results is a must
read for every current or aspiring executive seeking the best way
to manage and mitigate cybersecurity risk. It examines
cybersecurity as a tax on the organization and charts the best ways
leadership can be cybertax efficient. Viewing cybersecurity through
the cybertax lens provides an effective way for non-cybersecurity
experts in leadership to manage and govern cybersecurity in their
organizations The book outlines questions and leadership techniques
to gain the relevant information to manage cybersecurity threats
and risk. The book enables executives to: Understand cybersecurity
risk from a business perspective Understand cybersecurity risk as a
tax (cybertax) Understand the cybersecurity threat landscape Drive
business-driven questions and metrics for managing cybersecurity
risk Understand the Seven C's for managing cybersecurity risk
Governing the cybersecurity function is as important as governing
finance, sales, human resources, and other key leadership
responsibilities Executive leadership needs to manage cybersecurity
risk like they manage other critical risks, such as sales,
finances, resources, and competition. This book puts managing
cybersecurity risk on an even plane with these other significant
risks that demand leader ships' attention. The authors strive to
demystify cybersecurity to bridge the chasm from the
top-of-the-house to the cybersecurity function. This book delivers
actionable advice and metrics to measure and evaluate cybersecurity
effectiveness across your organization.
Cybersecurity risk is a top-of-the-house issue for all
organizations. Cybertax-Managing the Risks and Results is a must
read for every current or aspiring executive seeking the best way
to manage and mitigate cybersecurity risk. It examines
cybersecurity as a tax on the organization and charts the best ways
leadership can be cybertax efficient. Viewing cybersecurity through
the cybertax lens provides an effective way for non-cybersecurity
experts in leadership to manage and govern cybersecurity in their
organizations The book outlines questions and leadership techniques
to gain the relevant information to manage cybersecurity threats
and risk. The book enables executives to: Understand cybersecurity
risk from a business perspective Understand cybersecurity risk as a
tax (cybertax) Understand the cybersecurity threat landscape Drive
business-driven questions and metrics for managing cybersecurity
risk Understand the Seven C's for managing cybersecurity risk
Governing the cybersecurity function is as important as governing
finance, sales, human resources, and other key leadership
responsibilities Executive leadership needs to manage cybersecurity
risk like they manage other critical risks, such as sales,
finances, resources, and competition. This book puts managing
cybersecurity risk on an even plane with these other significant
risks that demand leader ships' attention. The authors strive to
demystify cybersecurity to bridge the chasm from the
top-of-the-house to the cybersecurity function. This book delivers
actionable advice and metrics to measure and evaluate cybersecurity
effectiveness across your organization.
"... an engaging book that will empower readers in both large and
small software development and engineering organizations to build
security into their products. ... Readers are armed with firm
solutions for the fight against cyber threats."-Dr. Dena Haritos
Tsamitis. Carnegie Mellon University"... a must read for security
specialists, software developers and software engineers. ... should
be part of every security professional's library." -Dr. Larry
Ponemon, Ponemon Institute"... the definitive how-to guide for
software security professionals. Dr. Ransome, Anmol Misra, and
Brook Schoenfield deftly outline the procedures and policies needed
to integrate real security into the software development process.
...A must-have for anyone on the front lines of the Cyber War ..."
-Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton
Associates"Dr. Ransome, Anmol Misra, and Brook Schoenfield give you
a magic formula in this book - the methodology and process to build
security into the entire software development life cycle so that
the software is secured at the source! "-Eric S. Yuan, Zoom Video
CommunicationsThere is much publicity regarding network security,
but the real cyber Achilles' heel is insecure software. Millions of
software vulnerabilities create a cyber house of cards, in which we
conduct our digital lives. In response, security people build ever
more elaborate cyber fortresses to protect this vulnerable
software. Despite their efforts, cyber fortifications consistently
fail to protect our digital treasures. Why? The security industry
has failed to engage fully with the creative, innovative people who
write software. Core Software Security expounds developer-centric
software security, a holistic process to engage creativity for
security. As long as software is developed by humans, it requires
the human element to fix it. Developer-centric security is not only
feasible but also cost effective and operationally relevant. The
methodology builds security into software development, which lies
at the heart of our cyber infrastructure. Whatever development
method is employed, software must be secured at the source. Book
Highlights: Supplies a practitioner's view of the SDL Considers
Agile as a security enabler Covers the privacy elements in an SDL
Outlines a holistic business-savvy SDL framework that includes
people, process, and technology Highlights the key success factors,
deliverables, and metrics for each phase of the SDL Examines cost
efficiencies, optimized performance, and organizational structure
of a developer-centric software security program and PSIRT Includes
a chapter by noted security architect Brook Schoenfield who shares
his insights and experiences in applying the book's SDL framework
View the authors' website at http://www.androidinsecurity.com/
Today's high-speed and rapidly changing development environments
demand equally high-speed security practices. Still, achieving
security remains a human endeavor, a core part of designing,
generating and verifying software. Dr. James Ransome and Brook S.E.
Schoenfield have built upon their previous works to explain that
security starts with people; ultimately, humans generate software
security. People collectively act through a particular and distinct
set of methodologies, processes, and technologies that the authors
have brought together into a newly designed, holistic, generic
software development lifecycle facilitating software security at
Agile, DevOps speed. -Eric. S. Yuan, Founder and CEO, Zoom Video
Communications, Inc. It is essential that we embrace a mantra that
ensures security is baked in throughout any development process.
Ransome and Schoenfield leverage their abundance of experience and
knowledge to clearly define why and how we need to build this new
model around an understanding that the human element is the
ultimate key to success. -Jennifer Sunshine Steffens, CEO of
IOActive Both practical and strategic, Building in Security at
Agile Speed is an invaluable resource for change leaders committed
to building secure software solutions in a world characterized by
increasing threats and uncertainty. Ransome and Schoenfield
brilliantly demonstrate why creating robust software is a result of
not only technical, but deeply human elements of agile ways of
working. -Jorgen Hesselberg, author of Unlocking Agility and
Cofounder of Comparative Agility The proliferation of open source
components and distributed software services makes the principles
detailed in Building in Security at Agile Speed more relevant than
ever. Incorporating the principles and detailed guidance in this
book into your SDLC is a must for all software developers and IT
organizations. -George K Tsantes, CEO of Cyberphos, former partner
at Accenture and Principal at EY Detailing the people, processes,
and technical aspects of software security, Building in Security at
Agile Speed emphasizes that the people element remains critical
because software is developed, managed, and exploited by humans.
This book presents a step-by-step process for software security
that uses today's technology, operational, business, and
development methods with a focus on best practice, proven
activities, processes, tools, and metrics for any size or type of
organization and development practice.
Mama's away one night, and her son can't sleep. He tries to relax by counting stars, but the more of them he sees, the more determined he is to count every single one. Then the boy finds that Daddy can't sleep either. Together, the two of them set off on an unforgettable all-night journey of discovery.
When a little girl in South Carolina finds a rope under a tree one
summer, she has no idea it will become part of her family's
history. But for three generations, that very rope is passed down,
used for everything from jump rope games to tying suitcases onto a
car for the big move north to New York City - and even for a family
reunion, where that first little girl is now a grandmother. This
rope, a simple but beloved possession, frames the family's story as
we follow them on their journey north during the time of the Great
Migration, when millions of African American families relocated
from the rural South.
First and foremost, Ransome and Misra have made an engaging book
that will empower readers in both large and small software
development and engineering organizations to build security into
their products. This book clarifies to executives the decisions to
be made on software security and then provides guidance to managers
and developers on process and procedure. Readers are armed with
firm solutions for the fight against cyber threats. -Dr. Dena
Haritos Tsamitis. Carnegie Mellon University In the wake of cloud
computing and mobile apps, the issue of software security has never
been more important than today. This book is a must read for
security specialists, software developers and software engineers.
The authors do a brilliant job providing common sense approaches to
achieving a strong software security posture and should be part of
every security professional's library. -Dr. Larry Ponemon, Ponemon
Institute Finally, the definitive how-to guide for software
security professionals. Dr. Ransome, Anmol Misra, and Brook
Schoenfield deftly outline the procedures and policies needed to
integrate real security into the software development process.In an
age of ubiquitous malware, this volume shows how inadequate
traditional network security models are and why security needs to
be software and developer-centric if it is to be relevant. A
must-have for anyone on the front lines of the Cyber War -
especially software developers and those who work with them.
-Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates
When it comes to software security, people usually think that the
solution is to hire a security expert to help you fix a security
issue or a hacker to identify vulnerabilities in the software. This
is typically a stop gap and workaround. Neither of these addresses
the root cause of software security. At its root, the cause lies
within the source code developed by software developers. Therefore,
security should be developer-centric, focused on the secure
development of the source code. Dr. Ransome, Anmol Misra, and Brook
Schoenfield give you a magic formula in this book - the methodology
and process to build security into the entire software development
life cycle so that the software is secured at the source -Eric S.
Yuan.Zoom Video Communications About the Book: There is much
publicity regarding network security, but the real cyber Achilles'
heel is insecure software. Millions of software vulnerabilities
create a cyber house of cards, in which we conduct our digital
lives. In response, security people build ever more elaborate cyber
fortresses to protect this vulnerable software. Despite their
efforts, cyber fortifications consistently fail to protect our
digital treasures. Why? The security industry has failed to engage
fully with the creative, innovative people who write software. Core
Software Security expounds developer-centric software security, a
holistic process to engage creativity for security. As long as
software is developed by humans, it requires the human element to
fix it. Developer-centric security is not only feasible but also
cost effective and operationally relevant. The methodology builds
security into software development, which lies at the heart of our
cyber infrastructure. Whatever development method is employed,
software must be secured at the source.Book Highlights: Supplies a
practitioner's view of the SDL Considers Agile as a security
enabler Covers the privacy elements in an SDL Outlines a holistic
business-savvy SDL framework that includes people, process, and
technology Highlights the key success factors, deliverables, and
metrics for each phase of the SDL Examines cost efficiencies,
optimized performance, and organizational structure of a
developer-centric software security program and PSIRT Includes a
chapter by noted security architect Brook Schoenfield who shares
his insights and experiences in applying the book's SDL framework
Finding sustainability for pastoral presence in corporate
for-profit healthcare can be a challenge for pastoral care
directors. In the midst of corporate acquistions, mid-level
managers often become the stabilizing element for staff as
corporate shuffling takes place. In this book, many culture
challenges stemming from corporate acquisitions have been addressed
and solutions explored as the author shares his extensive
experience setting the sails of sustainability for pastoral care
and presence in corporate run healtchare.This book is a must read
for corporate or not-for-profit hospital CEO's, COO's, CNO's,
ECO's, Director's of Pastoral Care, staff Chaplains, mid-level
health care managers and hospital employees.
Illus. in full color. As a seamstress in the Big House, Clara dreams of a reunion with her Momma, who lives on another plantation--and even of running away to freedom. Then she overhears two slaves talking about the Underground Railroad. In a flash of inspiration, Clara sees how she can use the cloth in her scrap bag to make a map of the land--a freedom quilt--that no master will ever suspect.
|
You may like...
Merry Christmas
Mariah Carey, Walter Afanasieff, …
CD
R122
R112
Discovery Miles 1 120
|