Software Security Engineering draws extensively on the systematic approach developed for the Build Security In (BSI) Web site. Sponsored by the Department of Homeland Security Software Assurance Program, the BSI site offers a host of tools, guidelines, rules, principles, and other resources to help project managers address security issues in every phase of the software development life cycle (SDLC). The book’s expert authors, themselves frequent contributors to the BSI site, represent two well-known resources in the security world: the CERT Program at the Software Engineering Institute (SEI) and Cigital, Inc., a consulting firm specializing in software security. This book will help you understand why Software security is about more than just eliminating vulnerabilities and conducting penetration tests Network security mechanisms and IT infrastructure security services do not sufficiently protect application software from security risks Software security initiatives should follow a risk-management approach to identify priorities and to define what is “good enough”–understanding that software security risks will change throughout the SDLC Project managers and software engineers need to learn to think like an attacker in order to address the range of functions that software should not do, and how software can better resist, tolerate, and recover when under attack
CERT® Resilience Management Model (CERT-RMM) is an innovative and transformative way to manage operational resilience in complex, risk-evolving environments. CERT-RMM distills years of research into best practices for managing the security and survivability of people, information, technology, and facilities. It integrates these best practices into a unified, capability-focused maturity model that encompasses security, business continuity, and IT operations. By using CERT-RMM, organizations can escape silo-driven approaches to managing operational risk and align to achieve strategic resilience management goals. This book both introduces CERT-RMM and presents the model in its entirety. It begins with essential background for all professionals, whether they have previously used process improvement models or not. Next, it explains CERT-RMM’s Generic Goals and Practices and discusses various approaches for using the model. Short essays by a number of contributors illustrate how CERT-RMM can be applied for different purposes or can be used to improve an existing program. Finally, the book provides a complete baseline understanding of all 26 process areas included in CERT-RMM. Part One summarizes the value of a process improvement approach to managing resilience, explains CERT-RMM’s conventions and core principles, describes the model architecturally, and shows how itsupports relationships tightly linked to your objectives. Part Two focuses on using CERT-RMM to establish a foundation for sustaining operational resilience management processes in complex environments where risks rapidly emerge and change. Part Three details all 26 CERT-RMM process areas, from asset definition through vulnerability resolution. For each, complete descriptions of goals and practices are presented, with realistic examples. Part Four contains appendices, including Targeted Improvement Roadmaps, a glossary, and other reference materials. This book will be valuable to anyone seeking to improve the mission assurance of high-value services, including leaders of large enterprise or organizational units, security or business continuity specialists, managers of large IT operations, and those using methodologies such as ISO 27000, COBIT, ITIL, or CMMI.
In order to work effectively with people with personality disorders it is important that Mental Health Social Workers (MHSWs) have a clear understanding of trauma and its impact on the person. It is also important that they have good relational skills and the support of the team and organisation. Drawing on an analysis of the similarities (and differences) in service user and MHSWs’ perspectives, the book outlines the further skills, knowledge and conditions that will help them to make a more effective contribution to the support of those with personality disorder. The book will appeal to qualified Mental Health Social Workers and those on Post-Qualifying Programmes because, uniquely, it explores personality disorder from a social work perspective.
The fourth in a series that documents architectural conservation in different parts of the world, Architectural Conservation in Australia, New Zealand and the Pacific Islands: National Experiences and Practice addresses cultural heritage protection in a region which comprises one third of the Earth’s surface. In response to local needs, Australia, New Zealand and the Pacific Islands have developed some of the most important and influential techniques, legislation, doctrine and theories in cultural heritage management in the world. The evolution of the heritage protection ethos and contemporary architectural conservation practices in Australia and Oceania are discussed on a national and regional basis using ample illustrations and examples. Accomplishments in architectural conservation are discussed in their national and international contexts, with an emphasis on original developments (solutions) and contributions made to the overall field. Enriched with essays contributed from fifty-nine specialists and thought leaders in the field, this book contains an extraordinary breadth and depth of research and synthesis on the why’s and how’s of cultural heritage conservation. Its holistic approach provides an essential resource and reference for students, academics, researchers, policy makers, practitioners and all who are interested in conserving the built environment.
This will help us customize your experience to showcase the most relevant content to your age group
Please select from below
Login
Not registered?
Sign up
Already registered?
Success – Your message will goes here
We'd love to hear from you!
Thank you for visiting our website. Would you like to provide feedback on how we could improve your experience?
This site does not use any third party cookies with one exception — it uses cookies from Google to deliver its services and to analyze traffic.Learn More.