Navigation überspringen
Universitätsbibliothek Heidelberg
Standort: ---
Exemplare: ---
 Online-Ressource
Titel:Application security
Titelzusatz:a complete guide
Mitwirkende:Fisher, Derek [Präsentator]   i
Institutionen:Manning (Firm), [Verlag]   i
Ausgabe:[First edition].
Verlagsort:[Place of publication not identified]
Verlag:Manning Publications
E-Jahr:2023
Jahr:[2023]
Umfang:1 online resource (1 video file (6 hr., 10 min.))
Illustrationen:sound, color.
Fussnoten:Online resource; title from title details screen (O'Reilly, viewed May 11, 2023)
Abstract:Every company uses software to function. From Fortune 500 technology companies to sole-proprietor landscaping firms, software is integral to businesses large and small. The right software, properly secured, can help organizations to move quickly and stay ahead of their competition. Business software provides a means to track employees, customers, inventory, and scheduling. Data moves from a myriad of systems, networks, and software applications, providing insights to businesses looking to stay competitive. Depending on the needs and resources of a company, it may develop and build its own software, or it may purchase ready-made software and integrate it into the business operations. What this means is that every organization, regardless of size and industry, has a software need. That is why there is an urgent need for people to develop and implement secure software. That's where this course comes in: it is designed to help you become one of those crucial people. This course will familiarize you with the common vulnerabilities that plague developed code, as outlined by the publications that set the industry standards, such as the OWASP Top 10 list of critical risks and the SANS Top 25 list of most dangerous flaws in software. You will understand what type of development behaviors lead to vulnerabilities and how to avoid those behaviors when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. You will also learn to review and operate developer analysis tools to discover vulnerabilities, allowing you to correct them early in the development life cycle. Finally, you will understand how application security fits in an overall cyber security program.
URL:Aggregator: https://learning.oreilly.com/library/view/-/10000DIVC202320/?ar
Datenträger:Online-Ressource
Sprache:eng
Sach-SW:Instructional films
 Nonfiction films
 Internet videos
K10plus-PPN:1846840961
 
 
Lokale URL UB: Zum Volltext
 
 Bibliothek der Medizinischen Fakultät Mannheim der Universität Heidelberg
 Klinikum MA Bestellen/Vormerken für Benutzer des Klinikums Mannheim
Eigene Kennung erforderlich
Bibliothek/Idn:UW / m4326730900
Lokale URL Inst.: Zum Volltext

Permanenter Link auf diesen Titel (bookmarkfähig):  https://katalog.ub.uni-heidelberg.de/titel/69080456   QR-Code
zum Seitenanfang