Secure Coding


Book Description

The authors look at the problem of bad code in a new way. Packed with advice based on the authors' decades of experience in the computer security field, this concise and highly readable book explains why so much code today is filled with vulnerabilities, and tells readers what they must do to avoid writing code that can be exploited by attackers. Writing secure code isn't easy, and there are no quick fixes to bad code. To build code that repels attack, readers need to be vigilant through each stage of the entire code lifecycle: Architecture, Design, Implementation, Testing and Operations. Beyond the technical, Secure Coding sheds new light on the economic, psychological, and sheer practical reasons why security vulnerabilities are so ubiquitous today. It presents a new way of thinking about these vulnerabilities and ways that developers can compensate for the factors that have produced such unsecured software in the past.







Handbook Of Industrial Automation


Book Description

Supplies the most essential concepts and methods necessary to capitalize on the innovations of industrial automation, including mathematical fundamentals, ergonometrics, industrial robotics, government safety regulations, and economic analyses.







Complete Guide to Digital Project Management


Book Description

Get a 360-degree view of digital project management. Learn proven best practices from case studies and real-world scenarios. A variety of project management tools, templates, models, and frameworks are covered. This book provides an in-depth view of digital project management from initiation to execution to monitoring and maintenance. Covering end-to-end topics from pre-sales to post-production, the book explores project management from various dimensions. Each core concept is complemented by case studies and real-world scenarios. The Complete Guide to Digital Project Management provides valuable tools for your use such as: Frameworks: governance, quality, knowledge transfer, root cause analysis, digital product evaluation, digital consulting, estimation Templates: estimation, staffing, resource induction, RACI Models: governance, estimation, pricing, digital maturity continuous execution, earned value management and effort forecast Metrics: project management, quality What You’ll Learn Study best practices and failure scenarios in digital projects, including common challenges, recurring problem themes, and leading indicators of project failures Explore an in-depth discussion of topics related to project quality and project governance Understand Agile and Scrum practices for Agile execution See how to apply Quality Management in digital projects, including a quality strategy, a quality framework, achieving quality in various project phases, and quality best practices Be able to use proven metrics and KPIs to track, monitor, and measure project performance Discover upcoming trends and innovations in digital project management Read more than 20 real-world scenarios in digital project management with proven best practices to handle the scenarios, and a chapter on a digital transformation case study Who This Book Is For Software project managers, software program managers, account managers, software architects, lead developers, and digital enthusiasts




Building and Implementing a Security Certification and Accreditation Program


Book Description

Building and Implementing a Security Certification and Accreditation Program: Official (ISC)2 Guide to the CAP CBK demonstrates the practicality and effectiveness of certification and accreditation (C&A) as a risk management methodology for IT systems in both public and private organizations. It provides security professiona




CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide


Book Description

This is the eBook version of the print title and might not provide access to the practice test software that accompanies the print book. Learn, prepare, and practice for CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam success with this Cert Guide from Pearson IT Certification, a leader in IT certification learning. Master the CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam topics: * Assess your knowledge with chapter-ending quizzes * Review key concepts with exam preparation tasks * Practice with realistic exam questions * Get practical guidance for next steps and more advanced certifications CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide is a best-of-breed exam study guide. Leading IT certification instructor Troy McMillan shares preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. CompTIA Cybersecurity Analyst (CySA+) CS0-002 Cert Guide presents you with an organized test preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will allow you to succeed on the exam the first time. The study guide helps you master all the topics on the CompTIA Cybersecurity Analyst (CySA+) CS0-002 exam, including * Vulnerability management activities * Implementing controls to mitigate attacks and software vulnerabilities * Security solutions for infrastructure management * Software and hardware assurance best practices * Understanding and applying the appropriate incident response * Applying security concepts in support of organizational risk mitigation




CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide


Book Description

This is the eBook version of the print title. Note that the eBook does not provide access to the practice test software that accompanies the print book. Access to the personal video mentoring is available through product registration at Cisco Press; or see the instructions in the back pages of your eBook. Learn, prepare, and practice for CCNP/CCIE Data Center Core DCCOR 350-601 exam success with this Cert Guide from Cisco Press, a leader in IT certification learning and the only self-study resource approved by Cisco. · Master CCNP/CCIE Data Center Core DCCOR 350-601 exam topics · Assess your knowledge with chapter-ending quizzes · Review key concepts with exam preparation tasks · Learn from more than two hours of video mentoring CCNP and CCIE Data Center Core DCCOR 350-601 Official Cert Guide is a best-of-breed exam study guide. Expert authors Somit Maloo and Firas Ahmed share preparation hints and test-taking tips, helping you identify areas of weakness and improve both your conceptual knowledge and hands-on skills. Material is presented in a concise manner, focusing on increasing your understanding and retention of exam topics. The book presents you with an organized test-preparation routine through the use of proven series elements and techniques. Exam topic lists make referencing easy. Chapter-ending Exam Preparation Tasks help you drill on key concepts you must know thoroughly. Review questions help you assess your knowledge, and a final preparation chapter guides you through tools and resources to help you craft your final study plan. The book also contains more than two hours of personal video mentoring from the Pearson IT Certification Complete Video Course. Go to the back pages of your eBook for instructions on how to access the personal video mentoring content. Well regarded for its level of detail, assessment features, and challenging review questions and exercises, this study guide helps you master the concepts and techniques that will help you succeed on the exam the first time. This official study guide helps you master all the topics on the CCNP/CCIE Data Center Core DCCOR 350-601 exam, including · Network · Compute · Storage Network · Automation · Security




The Blue Book


Book Description




Official (ISC)2® Guide to the CAP® CBK®, Second Edition


Book Description

Significant developments since the publication of its bestselling predecessor, Building and Implementing a Security Certification and Accreditation Program, warrant an updated text as well as an updated title. Reflecting recent updates to the Certified Authorization Professional (CAP®) Common Body of Knowledge (CBK®) and NIST SP 800-37, the Official (ISC)2® Guide to the CAP® CBK®, Second Edition provides readers with the tools to effectively secure their IT systems via standard, repeatable processes. Derived from the author’s decades of experience, including time as the CISO for the Nuclear Regulatory Commission, the Department of Housing and Urban Development, and the National Science Foundation’s Antarctic Support Contract, the book describes what it takes to build a system security authorization program at the organizational level in both public and private organizations. It analyzes the full range of system security authorization (formerly C&A) processes and explains how they interrelate. Outlining a user-friendly approach for top-down implementation of IT security, the book: Details an approach that simplifies the authorization process, yet still satisfies current federal government criteria Explains how to combine disparate processes into a unified risk management methodology Covers all the topics included in the Certified Authorization Professional (CAP®) Common Body of Knowledge (CBK®) Examines U.S. federal polices, including DITSCAP, NIACAP, CNSS, NIAP, DoD 8500.1 and 8500.2, and NIST FIPS Reviews the tasks involved in certifying and accrediting U.S. government information systems Chapters 1 through 7 describe each of the domains of the (ISC)2® CAP® CBK®. This is followed by a case study on the establishment of a successful system authorization program in a major U.S. government department. The final chapter considers the future of system authorization. The book’s appendices include a collection of helpful samples and additional information to provide you with the tools to effectively secure your IT systems.