Skip to Main Content
Information Security Management Handbook, Volume 7, 6th Edition
book

Information Security Management Handbook, Volume 7, 6th Edition

by Richard O'Hanley, James S. Tiller
August 2013
Intermediate to advanced content levelIntermediate to advanced
434 pages
15h 17m
English
Auerbach Publications
Content preview from Information Security Management Handbook, Volume 7, 6th Edition
334 ◾  Information Security Management Handbook
the application and the associated process designs for using the application. If the controls previ-
ous identified have not been implemented, then the application does not get to move forward in
the development cycle. If it is determined that a new control must be added because of an event
which affects the application security, then that control must be added into the development cycle.
While the SDLC provides a high degree of structure, many smaller organizations do not want
to follow one because they do incur cost. ey can slow down development time because of the
emphasis on identifying and meeting requirements. e problem is that the cost of fixing a bug
after the application is in production ...
Become an O’Reilly member and get unlimited access to this title plus top books and audiobooks from O’Reilly and nearly 200 top publishers, thousands of courses curated by job role, 150+ live events each month,
and much more.
Start your free trial

You might also like

Information Security Management Handbook, Volume 5, 6th Edition

Information Security Management Handbook, Volume 5, 6th Edition

Micki Krause Nozaki, Harold F. Tipton
Information Security for Managers

Information Security for Managers

Michael Workman, Daniel C. Phelps, John N. Gathegi

Publisher Resources

ISBN: 9781466567498