CSSLP Certification All-in-One Exam Guide, Second Edition

  • 8h 31m
  • Dan Shoemaker, Wm. Arthur Conklin
  • McGraw-Hill/Osborne
  • 2019

This self-study guide delivers 100% coverage of all domains in the CSSLP exam

Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP Certification All-in-One Exam Guide, Second Edition covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC)2®. You’ll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.

Covers all eight exam domains:

  • Secure Software Concepts
  • Secure Software Requirements
  • Secure Software Design
  • Secure Software Implementation/Programming
  • Secure Software Testing
  • Software Lifecycle Management
  • Software Deployment, Operations, and Maintenance
  • Supply Chain and Software Acquisition

About the Authors

Wm. Arthur Conklin, PhD, CompTIA Security+®, CISSP®, CSSLP, is an associate professor in the College of Technology at the University of Houston. He is the lead author of CompTIA Security+ All-in-One Exam Guide, Fifth Edition, and Principles of Computer Security: CompTIA Security+ and Beyond, Fifth Edition.

Daniel Shoemaker, PhD, is a professor and senior research scientist at the Univerisity of Detroit Mercy’s Center for Cyber Security and Intelligence Studies, which also includes the NSA Center of Academic Excellence in Information Assurance Education. Dr. Shoemaker has written four books and has over 200 publications, and he speaks extensively on security topics, both in the United States and internationally.

In this Book

  • Introduction
  • General Security Concepts
  • Risk Management
  • Security Policies and Regulations
  • Software Development Methodologies
  • Policy Decomposition
  • Data Classification and Categorization
  • Requirements
  • Design Processes
  • Design Considerations
  • Securing Commonly Used Architecture
  • Technologies
  • Common Software Vulnerabilities and Countermeasures
  • Defensive Coding Practices
  • Secure Software Coding Operations
  • Security Quality Assurance Testing
  • Security Testing
  • Secure Lifecycle Management
  • Secure Software Installation and Deployment
  • Secure Software Operations and Maintenance
  • Supply Chain and Software Acquisition
SHOW MORE
FREE ACCESS

YOU MIGHT ALSO LIKE

Rating 4.5 of 44 users Rating 4.5 of 44 users (44)
Rating 5.0 of 4 users Rating 5.0 of 4 users (4)

PEOPLE WHO VIEWED THIS ALSO VIEWED THESE

Rating 4.2 of 24 users Rating 4.2 of 24 users (24)
Rating 4.8 of 23 users Rating 4.8 of 23 users (23)