Description

Book Synopsis

Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequencesdata breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in soft

Table of Contents

Secure Software Concepts. Secure Software Requirements. Secure Software Design. Secure Software Implementation/Coding. Software Acceptance. Software Deployment, Operations, Maintenance, and Disposal. Supply Chain and Software Acquisition. Appendices.

Official ISC2 Guide to the CSSLP CBK

Product form

£75.99

Includes FREE delivery

RRP £79.99 – you save £4.00 (5%)

Order before 4pm today for delivery by Tue 13 Jan 2026.

A Hardback by Mano Paul

1 in stock


    View other formats and editions of Official ISC2 Guide to the CSSLP CBK by Mano Paul

    Publisher: Taylor & Francis Ltd
    Publication Date: 1/20/2013 12:08:00 AM
    ISBN13: 9781466571273, 978-1466571273
    ISBN10: 1466571276

    Description

    Book Synopsis

    Application vulnerabilities continue to top the list of cyber security concerns. While attackers and researchers continue to expose new application vulnerabilities, the most common application flaws are previous, rediscovered threats. For example, SQL injection and cross-site scripting (XSS) have appeared on the Open Web Application Security Project (OWASP) Top 10 list year after year over the past decade. This high volume of known application vulnerabilities suggests that many development teams do not have the security resources needed to address all potential security flaws and a clear shortage of qualified professionals with application security skills exists. Without action, this soft underbelly of business and governmental entities has and will continue to be exposed with serious consequencesdata breaches, disrupted operations, lost business, brand damage, and regulatory fines. This is why it is essential for software professionals to stay current on the latest advances in soft

    Table of Contents

    Secure Software Concepts. Secure Software Requirements. Secure Software Design. Secure Software Implementation/Coding. Software Acceptance. Software Deployment, Operations, Maintenance, and Disposal. Supply Chain and Software Acquisition. Appendices.

    Recently viewed products

    © 2026 Book Curl

      • American Express
      • Apple Pay
      • Diners Club
      • Discover
      • Google Pay
      • Maestro
      • Mastercard
      • PayPal
      • Shop Pay
      • Union Pay
      • Visa

      Login

      Forgot your password?

      Don't have an account yet?
      Create account