The Csslp Prep Guide: Mastering the Certified Secure Software Lifecycle Professional
The first test prep guide for the new ISC2 Certified Secure Software Lifecycle Professional exam
The CSSLP (Certified Secure Software Lifecycle Professional) is a new certification that incorporates government standards and best practices for secure software development. It emphasizes the application of secure software methodologies during the software development cycle. If you're an IT professional, security professional, software developer, project manager, software assurance tester, executive manager or employee of a government agency in a related field, your career may benefit from this certification.
Written by experts in computer systems and security, The CSSLP Prep Guide thoroughly covers all aspects of the CSSLP certification exam, with hundreds of sample test questions and answers available on the accompanying CD.
- The Certified Secure Software Lifecycle Professional (CSSLP) is an international certification incorporating new government, commercial, and university derived secure software development methods; it is a natural complement to the CISSP credential
- The study guide covers the seven domains of the CSSLP Common Body of Knowledge (CBK), namely Secure Software Concepts, Secure Software Requirements, Secure Software Design, and Secure Software Implementation/Coding and Testing,Secure Software Testing, Software Acceptance, and Software Deployment, Operations, Maintenance and Disposal
- Provides in-depth exploration and explanation of the seven CSSLP domains
- Includes a CD with hundreds of practice exam questions and answers
The CSSLP Prep Guide prepares you for the certification exam and career advancement.
Ronald l. Krutz, PhD, PE, CISSP, ISSEP, is a senior information system security consultant. He has more than thirty years of experience in distributed computing systems, computer architectures, real-time systems, information assurance methodologies, and information security training. He holds B.S., M.S., and Ph.D. degrees in electrical and computer engineering and is the author of bestselling texts in the area of information system security.
Alexander J. Fry, CSSLP, CISSP, ISSAP, ISSEP, LPT, is Principal Security Consultant at Strong Crypto LLC. He is active in the software assurance community and involved in web application security education and training.
Table of Contents
Chapter 1 Secure Software Concepts.
Chapter 2 Secure Software Requirements.
Chapter 3 Secure Software Design.
Chapter 4 Secure Software Implementation/Coding.
Chapter 5 Secure Software Testing.
Chapter 6 Software Acceptance.
Chapter 7 Software Deployment, Operations, and Maintenance.
Appendix A Answers to Assessment Questions.
Appendix B Glossary of Terms and Acronyms.
Sign up now »
- FTTechnical Business AnalystNSW
- FTLead Software EngineerSA
- FTQuality ManagerSA
- FTR&D EngineerSA
- FTJob Title: Mac Systems/ Enterprise Systems EngineerNZ
- FTSenior Python DeveloperNSW
- FTOS Web Applications DeveloperNSW
- FT.NET - Sitecore Developer - Melbourne - PermNSW
- FTFlash / ActionScript Developer - ContractNSW
Cloud computing promises to help midmarket companies reduce cost and complexity in the IT equation – and gain the flexibility and agility they need to thrive. Yet charting a clear ...
The nature of work has changed fundamentally and forever and it continues to evolve rapidly. Geographic distance and ...
"Suggesting that people's "purpose is to get information to flow through the ..."
Why change management doesn’t work
"Darn those pesky laws that get in the way of commercial exploitation ..."
Larry Page wants to see your medical records
"Instead of partitioning the device between corporate and personal data, another approach ..."
Dual-Persona Smartphones Not a BYOD Panacea
"Well that's a nice back-handed compliment isn't it? So now, finally, my ..."
After two-year hiatus, EFF accepts bitcoin donations again
"Actually, both Mobile App developers and CIOs should be blamed for it. ..."
CIOs struggle to deliver timely mobile business apps: survey
- Malware roundup: Tiffany's, Tibetans, iOs are targeted
- Schnucks wants federal court to handle data breach lawsuit
- Layered defenses largely fail to block exploits, says NSS
- Researchers warn of increased Zeus malware activity this year
- AusCERT 2013: Four dissenters to spur next year's security debates
- CITRIX SYNERGY ’13: Qureshi addresses the trend of ‘mojility’
- CITRIX SYNERGY ’13: IT needs to be empowered, says Sallam
- CITRIX SYNERGY ’13: Look beyond Cloud infrastructure, says Liang
- CITRIX SYNERGY ’13: Christiancen highlights the need for collaboration
- CITRIX SYNERGY ’13: Devices will change how people work, says Duursma
- Analytics and personalisation drive leading marketer behaviour: Report
- Innovation and big data take centre stage during CMO panel
- Twitter targets second screen interaction with Amplify advertising partnerships
- Facebook talks hyper-targeting, analytics and cross-platform at AANA event
- Tapping into social experience: Tourism Australia