-
Book Overview & Buying
-
Table Of Contents
The Official (ISC)2 Guide to the CCSP CBK - Second Edition
By :
Although some view a single point-in-time vulnerability scan as an indicator of trustworthiness, much more important is a holistic evaluation of the people, processes, and technology that delivered the software and will continue to maintain it. Several software development lifecycles have been published, and most of them contain similar phases. One software development lifecycle is structured like this:
As mentioned earlier in this domain, another software development lifecycle is arranged like this:
You can see the similarities between the two. There is a series of fairly intuitive phases in any lifecycle for developing software.
With the move to cloud-based applications, there has never been a greater importance of ensuring the security of applications that are being run in environments that may enjoy the...
Change the font size
Change margin width
Change background colour