Publisher's Synopsis
A valuable resource for preparing to take the Certified Secure Software Lifecycle Professional (CSSLP)
The steady rise of losses incurred by organizations from both insider and outsider attacks can, in large part, be attributed to a grave lack of software security. This increased abuse of software vulnerabilities has prompted government–imposed regulatory and compliance requirements. Enter the CSSLP exam. As a natural complement to the Certified Information Systems Security Professional (CISSP) credential, the CSSLP is a globally recognized standard of achievement and establishes an industry standard regarding the holder′s knowledge and understanding for applying best practices when delivering secure software. This essential guide prepares you for taking the CSSLP examination while enforcing the belief that secure software should be an integral part of the software lifecyle directly from conception.
Ronald L. Krutz and Alexander J. Fry walk you through the seven domains within the CSSLP′s Common Body of Knowledge (CBK): secure software concepts, secure software requirements, secure software design, secure software implementation/coding, secure software testing, software acceptance, and lastly, software deployment, operations, maintenance, and disposal. They address the fundamental security concepts of confidentiality, integrity, availability, authentication, authorization, and auditing, and convey the key concepts and principles that the CSSLP embodies. The combination of this essential information along with hundreds of featured review questions thoroughly prepares you for taking the CSSLP examination.
The CSSLP Prep Guide covers vital topics in the area of software security in addition to imparting beneficial insight for taking the Certification exam, and covers topics such as:
-
Translating security requirements into application design elements
-
Testing for security functionality and resiliency to attacks
-
Developing secure code
-
Identifying and mitigating software security abuse
-
Dealing with security implications during software development
-
Countering the increasing threats against software vulnerabilities