<?xml version="1.0" encoding="UTF-8"?>
<mods xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns="http://www.loc.gov/mods/v3" version="3.1" xsi:schemaLocation="http://www.loc.gov/mods/v3 http://www.loc.gov/standards/mods/v3/mods-3-1.xsd">
  <titleInfo>
    <title>Building Secure Software</title>
  </titleInfo>
  <name type="personal">
    <namePart>Mcgraw, [ MEI ] John Viega Gary.</namePart>
    <role>
      <roleTerm authority="marcrelator" type="text">creator</roleTerm>
    </role>
  </name>
  <name type="personal">
    <namePart>Viega, John</namePart>
  </name>
  <typeOfResource>text</typeOfResource>
  <originInfo>
    <place>
      <placeTerm type="text">S.l.]</placeTerm>
    </place>
    <publisher>Machinery Industry Press</publisher>
    <dateIssued>2013</dateIssued>
    <issuance>monographic</issuance>
  </originInfo>
  <physicalDescription>
    <extent>493 p</extent>
  </physicalDescription>
  <abstract>Paperback. Pub Date :2014-03-01 Pages: 336 Language: Chinese Publisher: Machinery safety technology known as book publishers of the Yellow Emperor by the security forces to create a pro-technology guru. best-selling global. digital security technology experts jointly recommended. Comprehensive discussion on how to build a security barrier in the entire software development life cycle. software for the design of safety guidelines given farsighted. comprehensive and informative. easy to understand. For any concern about the safety of software development people. is an essential book. The book is divided into two parts. The first part introduces the code should know before writing software security knowledge on how to introduce security in software engineering practice. any person involved in software development should read. The main contents include: Introduction to the guidi...</abstract>
  <subject>
    <topic>System design</topic>
  </subject>
  <subject>
    <topic>Computer security</topic>
  </subject>
  <subject>
    <topic>Development</topic>
  </subject>
  <subject>
    <topic>Information technology</topic>
  </subject>
  <subject>
    <topic>Security measures</topic>
  </subject>
  <subject>
    <topic>Computer networks</topic>
  </subject>
  <subject>
    <topic>Data protection</topic>
  </subject>
  <subject>
    <topic>Computer software</topic>
  </subject>
  <subject>
    <topic>Security measures</topic>
  </subject>
  <identifier type="isbn">7111459156 (paperback)</identifier>
  <identifier type="isbn">9787111459156 (paperback)</identifier>
  <identifier type="uri">http://www.amazon.com/exec/obidos/ASIN/7111459156/chopaconline-20</identifier>
  <location>
    <url>http://www.amazon.com/exec/obidos/ASIN/7111459156/chopaconline-20</url>
  </location>
  <recordInfo/>
</mods>
