CSSLP(r) Certification All-in-One Exam Guide

  • 8h 45m
  • Dan Shoemaker, Wm. Arthur Conklin
  • McGraw-Hill/Osborne
  • 2013

Get complete coverage of all the material included on the Certified Secure Software Lifecycle Professional exam. CSSLP All-in-One Exam Guide covers all eight exam domains developed by the International Information Systems Security Certification Consortium (ISC2). You'll find learning objectives at the beginning of each chapter, exam tips, practice questions, and in-depth explanations. Designed to help you pass the exam with ease, this definitive resource also serves as an essential on-the-job reference.

COVERS ALL EIGHT CERTIFIED SECURE SOFTWARE LIFECYCLE PROFESSIONAL EXAM DOMAINS:

  • Secure software concepts
  • Secure software requirements
  • Secure software design
  • Secure software implementation/coding
  • Secure software testing
  • Software acceptance
  • Software deployment, operations, maintenance, and disposal
  • Supply chain and software acquisitions

About the Authors

Wm. Arthur Conklin, Ph.D., CompTIA Security+, CISSP, is an assistant professor in the Information and Logistics Technology Department at the University of Houston. He is the lead author of CompTIA Security+ All-in-One Exam Guide, Third Edition, and Principles of Computer Security: CompTIA Security+ and Beyond, Second Edition.

Daniel Shoemaker, Ph.D., is the Director of the Centre for the Software Assurance Institute, a National Security Agency (NSA) Center of Academic Excellence, at the University of Detroit Mercy. He is also a professor at UDM where he has been the Chair of Computer and Information Systems since 1985. Dr. Shoemaker is Co-Chair of the Workforce Training and Education working group within the Department of Homeland Security’s National Cybersecurity Division (NCSD).

In this Book

  • CSSLP® Certification All-in-One Exam Guide
  • Introduction
  • General Security Concepts
  • Risk Management
  • Security Policies and Regulations
  • Software Development Methodologies
  • Policy Decomposition
  • Data Classification and Categorization
  • Requirements
  • Design Processes
  • Design Considerations
  • Securing Commonly Used Architecture
  • Technologies
  • Common Software Vulnerabilities and Countermeasures
  • Defensive Coding Practices
  • Secure Software Coding Operations
  • Security Quality Assurance Testing
  • Security Testing
  • Secure Software Acceptance
  • Secure Software Installation and Deployment
  • Secure Software Operations and Maintenance
  • Supply Chain and Software Acquisition
  • About the Download
  • Practice Exam
  • Glossary
SHOW MORE
FREE ACCESS