Software Security. Building Security In. Gary McGraw. A Addison-Wesley
|
|
|
- Dortha Tucker
- 10 years ago
- Views:
Transcription
1 Software Security Building Security In Gary McGraw A Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo Singapore Mexico City
2 Contents Foreword Preface xix xxiii Acknowledgments About the Author xxxi xxxv Part I: Software Security Fundamentals 1 1 Defining a Discipline 3 The Security Problem 4 The Trinity of Trouble: Why the Problem Is Growing 5 Basic Science 10 Security Problems in Software 14 Bugs and Flaws and Defects, Oh My! 14 The Range of Defects 18 The Problem with Application Security 20 Software Security and Operations 23 Solving the Problem: The Three Pillars of Software Security 25 Pillar I: Applied Risk Management 26 Pillar II: Software Security Touchpoints 27 Pillar III: Knowledge 35 The Rise of Security Engineering 37 Software Security Is Everyone's Job 38 xin
3 xiv Contents 2 A Risk Management Framework 39 Putting Risk Management into Practice 40 How to Use This Chapter 41 The Five Stages of Activity 42 Stage 1: Understand the Business Context 43 Stage 2: Identify the Business and Technical Risks 43 Stage 3: Synthesize and Rank the Risks 44 Stage 4: Define the Risk Mitigation Strategy 45 Stage 5: Carry Out Fixes and Validate 45 Measuring and Reporting on Risk 46 The RMF Is a Multilevel Loop 46 Applying the RMF: KillerAppCo's iware 1.0 Server 48 Understanding the Business Context 49 Identifying the Business and Technical Risks 50 Synthesizing and Ranking the Risks 63 Defining the Risk Mitigation Strategy 69 Carrying Out Fixes and Validating 73 The Importance of Measurement 73 Measuring Return 74 Measurement and Metrics in the RMF 75 The Cigital Workbench 76 Risk Management Is a Framework for Software Security 79 Part II: Seven Touchpoints for Software Security 81 3 Introduction to Software Security Touchpoints 83 Flyover: Seven Terrific Touchpoints Code Review (Tools) Architectural Risk Analysis Penetration Testing Risk-Based Security Testing Abuse Cases Security Requirements Security Operations 88 *. External Analysis 88 Why Only Seven? 89 Black and White: Two Threads Inextricably Intertwined 89 Moving Left 91 Touchpoints as Best Practices 94
4 Contents xv Who Should Do Software Security? 96 Building a Software Security Group 97 Software Security Is a Multidisciplinary Effort 100 Touchpoints to Success Code Review with a Tool 105 Catching Implementation Bugs Early (with a Tool) 106 Aim for Good, Not Perfect 108 Ancient History 109 Approaches to Static Analysis 110 The History of Rule Coverage 112 Modern Rules 114 Tools from Researchland 114 Commercial Tool Vendors 123 Commercial Source Code Analyzers 124 Key Characteristics of a Tool 125 Three Characteristics to Avoid 127 The Fortify Source Code Analysis Suite 127 The Fortify Knowledge Base 132 Using Fortify 134 Touchpoint Process: Code Review 135 Use a Tool to Find Security Bugs Architectural Risk Analysis 139 Common Themes among Security Risk Analysis Approaches 140 Traditional Risk Analysis Terminology 144 Knowledge Requirement 147 The Necessity of a Forest-Level View 148 A Traditional Example of a Risk Calculation 152 Limitations of Traditional Approaches 153 Modern Risk Analysis 154 Security Requirements 155 A Basic Risk Analysis Approach 156 Touchpoint Process: Architectural Risk Analysis 161 Attack Resistance Analysis 163 Ambiguity Analysis 165 Weakness Analysis 167 Getting Started with Risk Analysis 169 Architectural Risk Analysis Is a Necessity 170
5 xvi Contents 6 Software Penetration Testing 171 Penetration Testing Today 173 Software Penetration Testing a Better Approach 178 Make Use of Tools 179 Test More Than Once 182 Incorporating Findings Back into Development 183 Using Penetration Tests to Assess the Application Landscape 184 Proper Penetration Testing Is Good Risk-Based Security Testing 187 What's So Different about Security? 191 Risk Management and Security Testing 192 How to Approach Security Testing 193 Who 193 How 194 Thinking about (Malicious) Input 201 Getting Over Input 203 Leapfrogging the Penetration Test Abuse Cases 205 Security Is Not a Set of Features 209 What You Can't Do 210 Creating Useful Abuse Cases 211 But No One Would Ever Do That! 212 Touchpoint Process: Abuse Case Development 213 Creating Anti-Requirements 213 Creating an Attack Model 216 An Abuse Case Example 217 Abuse Cases Are Useful Software Security Meets Security Operations 223 Don't Stand So Close to Me 224 Kumbaya (for Software Security) 225 Come Together (Right Now) 232 Future's So Bright, I Gotta Wear Shades 235
6 Contents xvii Part III: Software Security Grows Up An Enterprise Software Security Program 239 The Business Climate 240 Building Blocks of Change 242 Building an Improvement Program 246 Establishing a Metrics Program 247 A Three-Step Enterprise Rollout 248 Continuous Improvement 250 What about COTS (and Existing Software Applications)? 251 An Enterprise Information Architecture 253 Adopting a Secure Development Lifecycle Knowledge for Software Security 259 Experience, Expertise, and Security 261 Security Knowledge: A Unified View 262 Security Knowledge and the Touchpoints 268 The Department of Homeland Security Build Security In Portal 269 Knowledge Management Is Ongoing 274 Software Security Now A Taxonomy of Coding Errors 277 On Simplicity: Seven Plus or Minus Two 279 Input Validation and Representation 279 API Abuse 279 Security Features 280 Time and State 280 Error Handling 281 Code Quality 281 Encapsulation 281 Environment 282 The Phyla 282 More Phyla Needed 289 A Complete Example 290 Lists, Piles, and Collections 292 Nineteen Sins Meet Seven Kingdoms 296 Seven Kingdoms and the O WASP Ten 297 Go Forth (with the Taxonomy) and Prosper 297
7 xviii Contents 13 Annotated Bibliography and References 299 Annotated Bibliography: An Emerging Literature 299 Required Reading: The Top Five 299 References Cited in Software Security: Building Security In 300 Government and Standards Publications Cited 312 Other Important References 313 Software Security Puzzle Pieces 318 Basic Science: Open Research Areas 319 Appendices 321 A Fortify Source Code Analysis Suite Tutorial Introducing the Audit Workbench Auditing Source Code Manually Ensuring a Working Build Environment Running the Source Code Analysis Engine Exploring the Basic SCA Engine Command Line Arguments Understanding Raw Analysis Results Integrating with an Automated Build Process Using the Audit Workbench Auditing Open Source Applications 342 B ITS4 Rules 345 C An Exercise in Risk Analysis: Smurfware 385 SmurfWare SmurfScanner Risk Assessment Case Study 385 SmurfWare SmurfScanner Design for Security 390 D Glossary 393 Index 395
Delivery. Enterprise Software. Bringing Agility and Efficiency. Global Software Supply Chain. AAddison-Wesley. Alan W. Brown.
Enterprise Software Delivery Bringing Agility and Efficiency Global Software Supply Chain to the Alan W. Brown AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto
SOA Governance. Stephen G. Bennett, Clive Gee, Robert Laird, Co-authored and edited by Thomas Erl. Governing
SOA Governance Governing Shared Services On-Premise and in the Cloud Co-authored and edited by Thomas Erl Stephen G. Bennett, Clive Gee, Robert Laird, Anne Thomas Manes, Robert Schneider, Leo Shuster,
Winning the Hardware-Software Game
Winning the Hardware-Software Game Using Game Theory to Optimize the Pace of New Technology Adoption Ruth D. Fisher PRENTICE Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal
MIKE COHN. Software Development Using Scrum. VAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco
Software Development Using Scrum MIKE COHN VAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Cape Town Sydney Tokyo Singapore
AGILE GAME DEVELOPMENT WITH SCRUM
AGILE GAME DEVELOPMENT WITH SCRUM CLINTON KEITH r A TT YAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Capetown Sydney Tokyo
Delivery. Continuous. Jez Humble and David Farley. AAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis San Francisco
Continuous Delivery Jez Humble and David Farley AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Madrid Cape Town Sydney Tokyo Singapore
RFID Field Guide. Deploying Radio Frequency Identification Systems. Manish Bhuptani Shahram Moradpour. Sun Microsystems Press A Prentice Hall Title
RFID Field Guide Deploying Radio Frequency Identification Systems Manish Bhuptani Shahram Moradpour Sun Microsystems Press A Prentice Hall Title PRENTICE HALL PTR Prentice Hall Professional Technical Reference
Building. Applications. in the Cloud. Concepts, Patterns, and Projects. AAddison-Wesley. Christopher M. Mo^ar. Cape Town Sydney.
Building Applications in the Cloud Concepts, Patterns, and Projects Christopher M. Mo^ar Upper Saddle River, NJ Boston AAddison-Wesley New York 'Toronto Montreal London Munich Indianapolis San Francisco
Development Processes (Lecture outline)
Development*Process*for*Secure* So2ware Development Processes (Lecture outline) Emphasis on building secure software as opposed to building security software Major methodologies Microsoft's Security Development
SOA with Java. Realizing Service-Orientation with Java Technologies UPPER SADDLE RIVER, NJ BOSTON INDIANAPOLIS SAN FRANCISCO
SOA with Java Realizing Service-Orientation with Java Technologies Thomas Erl, Andre Tost, Satadru Roy, and Philip Thomas PRENTICE HALL UPPER SADDLE RIVER, NJ BOSTON INDIANAPOLIS SAN FRANCISCO NEW YORK
Managing the Unmanageable
Managing the Unmanageable Rules, Tools, and Insights for Managing Software People and Teams MICKEY W. MANTLE RON LICHTY VVAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York
The Data Access Handbook
The Data Access Handbook Achieving Optimal Database Application Performance and Scalability John Goodson and Robert A. Steward PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New
Practical Intrusion Analysis
Practical Intrusion Analysis PREVENTION AND DETECTION FOR THE TWENTY-FIRST CENTURY Ryan Trost TT Ar Addison-Wesley Upper Saddle River, NJ Boston Indianapolis * San Francisco New York Toronto Montreal London
Web Development with TIBCO General Interface
Web Development with TIBCO General Interface Building AJAX Clients for Enterprise SOA Anil Gurnani /TAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London
Developing Secure Software, assignment 1
Developing Secure Software, assignment 1 During development of software, faults and flaws are introduced either from the implementation or from the design of the software. During runtime these faults and
Risk Analysis and the Security Survey
Risk Analysis and the Security Survey Fourth Edition James F. Broder Eugene Tucker ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Butterworth-Heinemann
Software Security Touchpoint: Architectural Risk Analysis
Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital Founded in 1992 to provide software security and software quality professional services Recognized
Essential Scrum. A Practical Guide to the Most Popular Agile Process. AAddison-Wesley. Upper Saddle River, NJ Boston Indianapolis
Essential Scrum A Practical Guide to the Most Popular Agile Process Kenneth S. Rubin AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris
BIRT: A Field Guide to Reporting
BIRT: A Field Guide to Reporting x:.-. ^ 11 Diana Peh Alethea Hannemann Nola Hague AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Parts
Security Metrics. A Beginner's Guide. Caroline Wong. Mc Graw Hill. Singapore Sydney Toronto. Lisbon London Madrid Mexico City Milan New Delhi San Juan
Security Metrics A Beginner's Guide Caroline Wong Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore Sydney Toronto Contents FOREWORD
The Crossroads of Accounting & IT
The Crossroads of Accounting & IT Donna Kay, MBA, PhD, CPA, CITP Maryville University of Saint Louis Ali Ovlia, MS, DM Webster University Pearson Boston Columbus- Indianapolis New York San Francisco Upper
Social Media Marketing
Social Media Marketing Tracy L. Tuten East Carolina University Michael R. Solomon The University of Manchester (U.K.) Saint Josephs University Boston Columbus Indianapolis New York San Francisco Upper
Database. Administration. The Complete. and Procedures. Guide to DBA Practices. AAddison-Wesley. Second Edition. Mullins
Database Administration The Complete Guide to DBA Practices and Procedures Second Edition Craig S. Mullins AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal
Maximum vsphere. Tips, How-Tos,and Best Practices for. Working with VMware vsphere 4. Eric Siebert. Simon Seagrave. Tokyo.
Maximum vsphere Tips, How-Tos,and Best Practices for Working with VMware vsphere 4 Eric Siebert Simon Seagrave PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal
Agile Methods. Introduction to. AAddison-Wesley. Sondra Ashmore, Ph.D. Kristin Runyan. Capetown Sydney Tokyo Singapore Mexico City
Introduction to Agile Methods Sondra Ashmore, Ph.D. Kristin Runyan AAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London Munich Paris Mad Capetown Sydney
Network Security Essentials:
Network Security Essentials: Applications and Standards Fifth Edition William Stallings International Editions contributions by B. R. Chandavarkar National Institute of Technology Karnataka, Surathkal
Management. Oracle Fusion Middleware. 11 g Architecture and. Oracle Press ORACLE. Stephen Lee Gangadhar Konduri. Mc Grauu Hill.
ORACLE Oracle Press Oracle Fusion Middleware 11 g Architecture and Management Reza Shafii Stephen Lee Gangadhar Konduri Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan
Measuring Data Quality for Ongoing Improvement
Measuring Data Quality for Ongoing Improvement A Data Quality Assessment Framework Laura Sebastian-Coleman ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish
CHAINED EXPLOITS Advanced Hacking Attacks from Start to Finish Andrew Whitaker Keatron Evans Jack B.Voth TT r\ Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal
Enterprise. ESXi in the. VMware ESX and. Planning Deployment of. Virtualization Servers. Edward L. Haletky
VMware ESX and ESXi in the Enterprise Planning Deployment of Virtualization Servers Edward L. Haletky PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London
Software Configuration Management Patterns
Software Configuration Management Patterns Effective Teamwork, Practical Integration.Nded mftmeretnetz g, STEPHEN P. BERCZUK with BRAD APPLETON v%addison-wesley Boston San Fransisco New York Toronto Montreal
Public Relations in Schools
Public Relations in Schools Fifth Edition Theodore J. Kowalski University of Dayton Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan
Agile Development & Business Goals. The Six Week Solution. Joseph Gee. George Stragand. Tom Wheeler
Agile Development & Business Goals The Six Week Solution Bill Holtsnider Tom Wheeler George Stragand Joseph Gee AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
BUSINESS INTELLIGENCE
SECOND EDITION BUSINESS INTELLIGENCE A MANAGERIAL APPROACH INTERNATIONAL EDITION Efraim Turban University of Hawaii Ramesh Sharda Oklahoma State University Dursun Deleii Oklahoma State University David
SOA Principles of Service Design
00_0132344823_FM.qxd 6/13/07 5:11 PM Page ix SOA Principles of Service Design Thomas Erl PRENTICE HALL UPPER SADDLE RIVER, NJ BOSTON INDIANAPOLIS SAN FRANCISCO NEW YORK TORONTO MONTREAL LONDON MUNICH PARIS
Development Effort & Duration
Practical Software Project Estimation: A Toolkit for Estimating Software Development Effort & Duration International Software Benchmarking Standards Group Compiled and edited by Peter R. Hill Mc Grauu
WebLogic Server 11g Administration Handbook
ORACLE: Oracle Press Oracle WebLogic Server 11g Administration Handbook Sam R. Alapati Mc Graw Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
QUANTITATIVE METHODS. for Decision Makers. Mik Wisniewski. Fifth Edition. FT Prentice Hall
Fifth Edition QUANTITATIVE METHODS for Decision Makers Mik Wisniewski Senior Research Fellow, Department of Management Science, University of Strathclyde Business School FT Prentice Hall FINANCIAL TIMES
CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY
CAREER DEVELOPMENT INTERVENTIONS IN THE 21 ST CENTURY FOURTH EDITION SPENCER G. NILES Pennsylvania State University JOANN HARRIS-BOWLSBEY Kuder, Inc., Adel, Iowa PEARSON Boston Columbus Indianapolis New
SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY. Global Edition. Christopher Lovelock. Yale University Jochen Wirtz National University of Singapore
Seventh Edition SERVICES MARKETING PEOPLE, TECHNOLOGY, STRATEGY Global Edition Christopher Lovelock Yale University Jochen Wirtz National University of Singapore Boston Columbus Indianapolis New York San
112 BSIMM Activities at a Glance
112 BSIMM Activities at a Glance (Red indicates most observed BSIMM activity in that practice) 6 Level 1 Activities Governance Strategy & Metrics (SM) Publish process (roles, responsibilities, plan), evolve
How To Write A Web Framework In Java
Seam Framework Experience the Evolution of Java ЕЕ Second Edition Michael Juntao Yuan Jacob Orshalick Thomas Heute PRENTICE HALL Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto
Relationship marketing
Relationship marketing WBIbliothek Exploring relational strategies in marketing FOURTH EDITION JOHN EGAN London South Bank University Financial Times Prentice Hall is an imprint of Harlow, England London
Developer's Cookbook. Building Applications with. The Android. the Android SDK. A Addison-Wesley. James Steele Nelson To
The Android Developer's Cookbook Building Applications with the Android SDK James Steele Nelson To A Addison-Wesley Upper Saddle River, NJ Boston «Indianapolis San Francisco New York Toronto Montreal London
ENTERPRISE SYSTEMS FOR MANAGEMENT
I I Second Edition ENTERPRISE SYSTEMS FOR MANAGEMENT Luvai F. Motiwalla University of Massachusetts Lowell and Jeff Thompson Oracle Consulting PEARSON Boston Columbus Indianapolis New York San Francisco
CONTEMPORARY DIRECT & INTERACTIVE MARKETING
SECOND EDITION CONTEMPORARY DIRECT & INTERACTIVE MARKETING Lisa D. Spiller Christopher Newport University Martin Baier Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape
Computing. Federal Cloud. Service Providers. The Definitive Guide for Cloud. Matthew Metheny ELSEVIER. Syngress is NEWYORK OXFORD PARIS SAN DIEGO
Federal Cloud Computing The Definitive Guide for Cloud Service Providers Matthew Metheny ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEWYORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO
Contents. Assessing Social Media Security. Chapter! The Social Media Security Process 3
Securing the Clicks: Network Security in the Age of Social Media Gary Bahadur Jason I nasi Alex de Carvalho Mc ssr New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan
Macroeconomics. Manfred Gartner. Prentice Hall THIRD EDITION. University of St Gallen, Switzerland. An imprint of Pearson Education
Macroeconomics THIRD EDITION Manfred Gartner University of St Gallen, Switzerland Prentice Hall FINANCIAL TIMES An imprint of Pearson Education Harlow, England London New York Boston San Francisco Toronto
Purchasing and Supply Chain Management
Eighth Edition Purchasing and Supply Chain Management KENNETH LYSONS MA, MEd, PhD, Dipl.PA, AcDip.Ed., DMS, FCIS, FCIPS, Flnst M, MILT BRIAN FARRINGTON BSc(Econ), MSc, PhD, FCIPS PEARSON Harlow, England
How To Write A Diagram
Data Model ing Essentials Third Edition Graeme C. Simsion and Graham C. Witt MORGAN KAUFMANN PUBLISHERS AN IMPRINT OF ELSEVIER AMSTERDAM BOSTON LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE
IMPROVEMENT THE PRACTITIONER'S GUIDE TO DATA QUALITY DAVID LOSHIN
i I I I THE PRACTITIONER'S GUIDE TO DATA QUALITY IMPROVEMENT DAVID LOSHIN ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan Kaufmann
Computer Security. Introduction to. Michael T. Goodrich Department of Computer Science University of California, Irvine. Roberto Tamassia PEARSON
Introduction to Computer Security International Edition Michael T. Goodrich Department of Computer Science University of California, Irvine Roberto Tamassia Department of Computer Science Brown University
Enterprise Integration Patterns
Enterprise Integration Patterns Designing, Building, and Deploying Messaging Solutions Gregor Hohpe Bobby Woolf With Contributions by Kyle Brown Conrad F. D'Cruz Martin Fowler Sean Neville Michael J. Rettig
Programming Flaws and How to Fix Them
19 ö Programming Flaws and How to Fix Them MICHAEL HOWARD DAVID LEBLANC JOHN VIEGA McGraw-Hill /Osborne New York Chicago San Francisco Lisbon London Madrid Mexico City- Milan New Delhi San Juan Seoul Singapore
DEC Networks and Architectures
DEC Networks and Architectures Carl Malamud Intertext Publications McGraw-Hill Book Company New York St. Louis San Francisco Auckland Bogota Hamburg London Madrid Mexico Milan Montreal New Delhi Panama
Network Security. Windows 2012 Server. Securing Your Windows. Infrastructure. Network Systems and. Derrick Rountree. Richard Hicks, Technical Editor
Windows 2012 Server Network Security Securing Your Windows Network Systems and Infrastructure Derrick Rountree Richard Hicks, Technical Editor AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN
THE PSYCHOLOGY OF INVESTING
Fourth Edition THE PSYCHOLOGY OF INVESTING John R. Nofsinger Washington State University Prentice Hall Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London
IT Manager's Handbook
IT Manager's Handbook Getting your new job done Third Edition Bill Holtsnider Brian D. Jaffe AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY TOKYO Morgan
Performance Management
Third Edition A "2.T4 %4if. Oo$ Performance Management Herman Aguinis Kelley School of Business Indiana University PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam
Visual Storytelling with D3
Visual Storytelling with D3 An Introduction to Data Visualization in JavaScript Ritchie S. King TT ArAddison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco New York Toronto Montreal London
Software Security Engineering: A Key Discipline for Project Managers
Software Security Engineering: A Key Discipline for Project Managers Julia H. Allen Software Engineering Institute (SEI) Email: [email protected] Sean Barnum Cigital Robert J. Ellison SEI Gary McGraw Cigital
Financial Statement Analysis
Financial Statement Analysis Valuation Credit analysis Executive compensation Christian V. Petersen and Thomas Plenborg Financial Times Prentice Hall is an imprint of Harlow, England London New York Boston
BUSINESS AND PROFESSIONAL COMMUNICATION
Fifth Edition BUSINESS AND PROFESSIONAL COMMUNICATION PLANS, PROCESSES, AND PERFORMANCE James R. DiSanza Idaho State University Nancy J. Legge Idaho State University Allyn & Bacon Boston Columbus Indianapolis
VALUATION The Art and Science of Corporate Investment Decisions
VALUATION The Art and Science of Corporate Investment Decisions Second Edition SHERIDAN TITMAN University of Texas at Austin JOHN D. MARTIN Baylor University Prentice Hall Boston Columbus Indianapolis
How To Understand The Software Development Lifecycle
REQUIREMENTS ANALYSIS AND SYSTEM DESIGN third edition LESZEKA. MACIASZEK ADDISON-WESLEY An imprint of Pearson Education Harlow, England London New York Boston San Francisco Toronto Sydney Singapore Hong
Securing the Cloud. Cloud Computer Security Techniques and Tactics. Vic (J.R.) Winkler. Technical Editor Bill Meine ELSEVIER
Securing the Cloud Cloud Computer Security Techniques and Tactics Vic (J.R.) Winkler Technical Editor Bill Meine ELSEVIER AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO
CRYPTOGRAPHY AND NETWORK SECURITY
CRYPTOGRAPHY AND NETWORK SECURITY PRINCIPLES AND PRACTICE SIXTH EDITION William Stallings International Edition contributions by Mohit P Tahiliani NITK Surathkal PEARSON Boston Columbus Indianapolis New
International Investments
2008 AGI-Information Management Consultants May be used for personal purporses only or by libraries associated to dandelon.com network. International Investments Bruno Solnik H.E.C. SCHOOL of MANAGEMENT
Advertising Research
Second Edition Advertising Research THEORY AND PRACTICE Joel J. Davis School of Journalism & Media Studies, San Diego State University Prentice Hall Boston Columbus Indianapolis New York San Francisco
Cutting Edge Practices for Secure Software Engineering
Cutting Edge Practices for Secure Software Engineering Kanchan Hans Amity Institute of Information Technology Amity University, Noida, 201301, India [email protected] Abstract Security has become a high
Surreptitious Software
Surreptitious Software Obfuscation, Watermarking, and Tamperproofing for Software Protection Christian Collberg Jasvir Nagra rw T Addison-Wesley Upper Saddle River, NJ Boston Indianapolis San Francisco
for Research and Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate
Project Management for Research and Development Guiding Innovation for Positive R&D Outcomes Lory Mitchell Wingate CRC Press Taylor & Francis Group BocaRaton London New York CRC Press is an imprint of
Customer Relationship. Management. Ed Peelen and Rob Beltman
Customer Relationship Management Ed Peelen and Rob Beltman PEARSON Harlow, England London New York Boston San Francisco Toronto Sydney Auckland Singapore Hong Kong Tokyo Seoul Taipei New Delhi Cape Town
Customer Relationship Management
Customer Relationship Management Concepts and Technologies Second edition Francis Buttle xlloillvlcjx. AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO SAN FRANCISCO SINGAPORE SYDNEY
Master Data Management
Master Data Management David Loshin AMSTERDAM BOSTON HEIDELBERG LONDON NEW YORK OXFORD PARIS SAN DIEGO Ик^И V^ SAN FRANCISCO SINGAPORE SYDNEY TOKYO W*m k^ MORGAN KAUFMANN PUBLISHERS IS AN IMPRINT OF ELSEVIER
Job Hazard Analysis. A Guide for Voluntary Compliance and Beyond. From Hazard to Risk: Transforming the JHA from a Tool to a Process
Job Hazard Analysis A Guide for Voluntary Compliance and Beyond From Hazard to Risk: Transforming the JHA from a Tool to a Process James E. Roughton Nathan Crutchfield E L S E V I E R AMSTERDAM. BOSTON.
Knowledge Management
Series on Innovation and Knowledge - Vol. 11 Knowledge An Interdisciplinary Perspective Sajjad M Jasimuddin Aberystwyth University, UK World Scientific NEW JERSEY LONDON SINGAPORE BEIJING SHANGHAI HONG
Computer Organization
Computer Organization and Architecture Designing for Performance Ninth Edition William Stallings International Edition contributions by R. Mohan National Institute of Technology, Tiruchirappalli PEARSON
JAVA r VOLUME II-ADVANCED FEATURES. e^i v it;
..ui. : ' :>' JAVA r VOLUME II-ADVANCED FEATURES EIGHTH EDITION 'r.", -*U'.- I' -J L."'.!'.;._ ii-.ni CAY S. HORSTMANN GARY CORNELL It.. 1 rlli!>*-
Master Data Management and Data Governance Second Edition
Master Data Management and Data Governance Second Edition Alex Berson Larry Dubov Mc Grauu Hill New York Chicago San Francisco Lisbon London Madrid Mexico City Milan New Delhi San Juan Seoul Singapore
Applications. Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0. Oracle Press ORACLE. Philipp Weckerle.
ORACLE Oracle Press Oracle WebCenter 11 g Handbook: Build Rich, Customizable Enterprise 2.0 Applications Frederic Desbiens Peter Moskovits Philipp Weckerle Mc Graw Hill New York Chicago San Francisco Lisbon
for Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland
PERFECT PHRASES for Hundreds of Ready-to-Use Phrases to Set the Stage for Productive Conversations, Meetings, and Events Meryl Runion with Diane Windingland Mc Graw Hill New York Chicago San Francisco
Business Administration of Windchill PDMLink 10.0
Business Administration of Windchill PDMLink 10.0 Overview Course Code Course Length TRN-3160-T 3 Days After completing this course, you will be well prepared to set up and manage a basic Windchill PDMLink
Application Security Center overview
Application Security overview Magnus Hillgren Presales HP Software Sweden Fredrik Möller Nordic Manager - Fortify Software HP BTO (Business Technology Optimization) Business outcomes STRATEGY Project &
Social Work, Social Welfare, and American Society
Social Work, Social Welfare, and American Society Philip R. Popple University of Texas at Arlington Leslie Leighninger Arizona State University Allyn & Bacon Boston Columbus Indianapolis New York San Francisco
Using Ml. David M. Kroenke PEARSON
r.j*v.-t #** Using Ml David M. Kroenke PEARSON Boston Columbus Indianapolis New York San Francisco Upper Saddle River Amsterdam Cape Town Dubai London Madrid Milan Munich Paris Montreal Toronto Delhi Mexico
Oracle Backup & Recovery
ORACLG«Oracle Press Oracle Backup & Recovery Rama Velpuri Osborne McGraw-Hill Berkeley New York St. Louis San Francisco Auckland Bogota Hamburg London Madrid Mexico City Milan Montreal New Delhi Panama
