Applications and Systems-Development Security

Table of contents:

Introduction

Well-written applications are the key to good security. As such, this chapter focuses on the security requirements that are needed when developing applications. Although this chapter won't make you into a programmer, it will help you understand the steps required to build robust and secure applications.

To become certified as a CISSP, ISC2 expects test candidates to understand how to develop secure applications, know the steps of the system development life cycle, have knowledge of database design and structure, and be able to recognize and respond to malicious code and system vulnerabilities.

The CISSP Cram Sheet

A Note from Series Editor Ed Tittel

About the Author

Acknowledgments

We Want to Hear from You!

Introduction

Self-Assessment

The CISSP Certification Exam

Physical Security

Security-Management Practices

Access-Control Systems and Methodology

System Architecture and Models

Telecommunications and Network Security

Applications and Systems-Development Security

Operations Security

Business Continuity Planning

Law, Investigations, and Ethics

Cryptography

Practice Exam 1

Answers to Practice Exam 1

Practice Exam 2

Answers to Practice Exam 2



CISSP Exam Cram 2
CISSP Exam Cram 2
ISBN: 078973446X
EAN: 2147483647
Year: 2003
Pages: 204
Authors: Michael Gregg

Flylib.com © 2008-2020.
If you may any questions please contact us: flylib@qtcs.net