Software security : concepts & practices / Suhel Ahmad Khan, Rajeev Kumar, Raees Ahmad Khan.
Material type: TextEdition: First editionDescription: pages cmISBN: 9781032356310; 9781032361598Subject(s): Application software -- Development | Software architecture | Computer software -- Security measures | Data protection | Computer securityAdditional physical formats: Online version:: Software securityDDC classification: 005.1 LOC classification: QA76.76.D47 | K527 2023Summary: "Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more"--Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode |
---|---|---|---|---|---|---|---|
General Circulation | APU Library Open Shelf | Book | QA76.76.D47 K527 2023 c.1 (Browse shelf (Opens below)) | 1 | Available | 00013078 |
Browsing APU Library shelves, Shelving location: Open Shelf, Collection: Book Close shelf browser (Hides shelf browser)
QA76.76.D47 K46 1997 c.1 Software project management : | QA76.76.D47 K46 1997 c.2 Software project management : | QA76.76.D47 K46 1997 c.3 Software project management : | QA76.76.D47 K527 2023 c.1 Software security : concepts & practices / | QA76.76.D47 K55 2013 c.1 Design for software : | QA76.76.D47 K55 2013 c.2 Design for software : | QA76.76.D47 K56 2001 c.1 Building Delphi 6 applications / |
Includes bibliographical references and index.
"Software Security: Concepts & Practices is designed as a textbook and explores fundamental security theories that govern common software security technical issues. It focuses on the practical programming materials that will teach readers how to implement security solutions using the most popular software packages. It's not limited to any specific cybersecurity subtopics and the chapters touch upon a wide range of cybersecurity domains, ranging from malware to biometrics and more"--
There are no comments on this title.