Application Security in the ISO27001 Environment demonstrates how to secure software applications using ISO/IEC 27001. It does this in the context of a wider roll out of an information security management system (ISMS) that conforms to ISO/IEC 27001. Over 224 pages, they address a range of essential topics, including an introduction to ISO27001 and ISO27002, secure development lifecycles, threat profiling and security testing, and secure coding guidelines. As well as showing how to use ISO27001 to secure individual applications, the book demonstrates how to tackle this issue as part of the development and roll out of an organisation-wide Information Security Management System conforming to the Standard. Software packages are the conduits to critical business data, thus securing applications adequately is of the utmost importance. Thus you must order a copy of this book today, as it is the de-facto standard on application security in the ISO/IEC 27001 environment. Key Features: De-facto standard on application security in the ISO/IEC 27001 environment. Leads the reader step-by-step through all of the phases of how to secure software applications in the context of rolling out of an ISO/IEC 27001 ISMS. Demonstrates how to secure such mainstream applications as the Microsoft Office suite, SAP, Lotus Notes, Adobe applications, SAGE, Skype, and many other software applications.
Table of Contents
You are viewing the table of contents
You do not have access to this
on JSTOR. Try logging in through your institution for access.