Skip to Content
Information Security Management Handbook, Volume 5, 6th Edition
book

Information Security Management Handbook, Volume 5, 6th Edition

by Micki Krause Nozaki, Harold F. Tipton
April 2016
Intermediate to advanced content levelIntermediate to advanced
558 pages
19h 52m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 5, 6th Edition
306 ◾  Information Security Management Handbook
Table 20.1 highlights the security challenges for adopting these models and the relative advan-
tages and disadvantages.
Securing SaaS Applications
We have identified the following key mitigation strategies for addressing the above critical security
challenges and improving the robustness of the SaaS applications:
Secure product engineering
Secure deployment
Governance and regulatory compliance audits
ird-Party SaaS security assessment
Secure Product Engineering
Product vendors are always rushing to meet market release deadlines. Consequently, product secu-
rity is often given lesser precedence. ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 7, 6th Edition

Information Security Management Handbook, Volume 7, 6th Edition

Richard O'Hanley, James S. Tiller
Physical Security and Safety

Physical Security and Safety

Truett A. Ricks, Bobby E. Ricks, Jeffrey Dingle

Publisher Resources

ISBN: 9781439853467