Fundamentals of secure software /

Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. It may include hardware, software, and procedures that identify or minimize security vulnerabilities. Web application security is the process of se...

Full description

Saved in:
Bibliographic Details
Format: Electronic Video
Language:English
Published: [Birmingham, England] : Packt Publishing Ltd., [2022]
Edition:[First edition].
Subjects:
Online Access:CONNECT

MARC

LEADER 00000ngm a22000007i 4500
001 in00006324798
006 m o c
007 vz czazuu
007 cr cnannnuuuuu
008 230124s2022 enk395 o vleng d
005 20230208205945.9
035 |a 1WRLDSHRon1365103954 
040 |a ORMDA  |b eng  |e rda  |e pn  |c ORMDA 
020 |a 9781837636815  |q (electronic video) 
020 |a 1837636818  |q (electronic video) 
035 |a (OCoLC)1365103954 
037 |a 9781837636815  |b O'Reilly Media 
050 4 |a QA76.76.A65 
082 0 4 |a 005.3  |2 23/eng/20230124 
049 |a TXMM 
245 0 0 |a Fundamentals of secure software /  |c Derek Fisher. 
250 |a [First edition]. 
264 1 |a [Birmingham, England] :  |b Packt Publishing Ltd.,  |c [2022] 
300 |a 1 online resource (1 video file (6 hr., 35 min.)) :  |b sound, color. 
306 |a 063500 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a video  |b v  |2 rdamedia 
337 |a computer  |b c  |2 rdamedia 
338 |a other  |b vz  |2 rdacarrier 
338 |a online resource  |b cr  |2 rdacarrier 
344 |a digital  |2 rdatr 
347 |a video file  |2 rdaft 
380 |a Instructional films  |2 lcgft 
511 0 |a Derek Fisher, presenter. 
520 |a Application security describes security measures at the application level that aim to prevent data or code within the app from being stolen or hijacked. It may include hardware, software, and procedures that identify or minimize security vulnerabilities. Web application security is the process of securing websites, web applications, and other internet-based services from cyber-attacks, breaches, and security threats that leverage loopholes, misconfigurations, and vulnerabilities in these applications or their codes. This course will familiarize you with the common vulnerabilities that plague developed code as outlined in publications such as the OWASP Top 10 and SANS Top 25. You will understand what type of development behaviors lead to vulnerabilities and how to avoid those behaviors when creating secure code. You will learn how to perform a threat model on development features to understand what threats could impact your code, where they come from, and how to mitigate them. You will also review and operate analysis tools that are available to developers in order to analyze their code and discover vulnerabilities, allowing you to correct them early in the development lifecycle. Finally, you will understand how application security fits in an overall cybersecurity program. By the end of this course, you will have learned the basic fundamentals, best practices and tools to be used for application security. 
588 0 |a Online resource; title from title details screen (O'Reilly, viewed January 24, 2023). 
590 0 |a O'Reilly Online Learning Platform: Academic Edition (SAML SSO Access) 
650 0 |a Application software  |x Security measures. 
650 0 |a Computer security. 
655 7 |a Instructional films.  |2 lcgft 
655 7 |a Nonfiction films.  |2 lcgft 
655 7 |a Internet videos.  |2 lcgft 
700 1 |a Fisher, Derek,  |e presenter. 
710 2 |a Packt Publishing,  |e publisher. 
730 0 |a WORLDSHARE SUB RECORDS 
856 4 0 |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781837636815/?ar  |z CONNECT  |3 O'Reilly  |t 0 
949 |a ho0 
994 |a 92  |b TXM 
998 |a wi 
999 f f |s 9127faec-fcb9-4d32-a502-ecb48787db73  |i 2783463d-77b7-463a-9c13-874b4ba66f0f  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 0  |e QA76.76.A65   |h Library of Congress classification 
856 4 0 |3 O'Reilly  |t 0  |u https://go.oreilly.com/middle-tennessee-state-university/library/view/-/9781837636815/?ar  |z CONNECT