Synopses & Reviews
Leading IT security experts fully cover CSSLPthe secure software certification exam from (ISC)2
CSSLP All-in-One Exam Guide offers comprehensive coverage of the Certified Secure Software Lifecycle Professional (CSSLP) examthe new certification from (ISC)2, creator of the CISSP exam. This authoritative guide covers all of the exam objectives, and includes Exam Tips that highlight actual exam topics, plus technical discussion sidebars.
Hands-on examples and exercises reinforce the concepts presented for real-world practice, and sample questions at the end of each chapter test for comprehension and prepare you for each subject area of the exam. CSSLP All-in-One Exam Guide also serves as a valuable on-the-job reference for software development program managers, government employees, and contractors subject to new government security requirements.
CSSLP All-in-One Exam Guide
- Offers 100% coverage of all exam topics
- Includes a CD-ROM with more than 250 practice questions in a Windows-based test engine, video training from the author, and an ebook
- Provides a low-cost, self-study training solution from a trusted IT security expert
- Serves as a valuable on-the-job reference after certification
Covers all CSSLP exam objectives:
Secure Software Concepts; Security Concepts; Risk Management; Security Policies and Regulations; Software Development Methodologies; Secure Software Requirements; Policy Decomposition; Identification and Gathering; Secure Software Design; Design Processes; Design Considerations; Architecture; Technologies; Design and Architecture Technical Review; Secure Software Implementation/Coding; Common Software Vulnerabilities and Countermeasures; Defensive Coding Practices; Secure Software Coding Operations; Secure Software Testing; Security Quality Assurance Testing; Security Test Types; Secure Software Acceptance; Secure Software Acceptance; Secure Software Installation, Deployment, Operations, Maintenance and Disposal
Table of Contents
Part I: Secure Software Concepts Chapter 1: Security Concepts
Chapter 2: Risk management
Chapter 3: Security Policies and Regulations
Chapter 4: Software Development Methodologies
Part II: Secure Software Requirements
Chapter 5: Policy Decomposition
Chapter 6: Identification and Gathering
Part III: Secure Software Design
Chapter 7: Design Processes
Chapter 8: Design Considerations
Chapter 9: Architecture
Chapter 10: Technologies
Chapter 11:Design and architecture technical review
Part IV: Secure Software Implementation/Coding
Chapter 12: Common software vulnerabilities and countermeasures
Chapter 13: Defensive coding practices
Chapter 14: Secure Software Coding Operations
Part V: Secure Software Testing
Chapter 15:Security Quality Assurance Testing
Chapter 16: Security Test types
Part VI: Secure Software Acceptance
Chapter 17: Secure Software Acceptance
Part VII: Secure Software Installation, Deployment, Operations, Maintenance and Disposal
Chapter 18: Secure Software Installation and Deployment
Chapter 19: Secure Software Operations and Maintenance