1answer.
Ask question
Login Signup
Ask question
All categories
  • English
  • Mathematics
  • Social Studies
  • Business
  • History
  • Health
  • Geography
  • Biology
  • Physics
  • Chemistry
  • Computers and Technology
  • Arts
  • World Languages
  • Spanish
  • French
  • German
  • Advanced Placement (AP)
  • SAT
  • Medicine
  • Law
  • Engineering
prohojiy [21]
2 years ago
12

Secure software development: a security programmer's guide by jason grembi isbn-10: 1-4180-6547-1, isb-13: 978-1-4180-6547

Computers and Technology
1 answer:
a_sh-v [17]2 years ago
7 0

Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

<h3>What is secure software development practices?</h3>

Secure software development is  seen as a method that is used form the creation of a lot of software that uses both security into all of the phase of the software development making cycle.

This book is known to be  A Programmer's Guide that can be able to  leads readers in all of the tasks and activities that one can do to be successful computer programmers and it is one that helps to navigate in the area of reading and analyzing requirements as well as choosing development tools, and others.

Hence, Secure software development is known to be a kind of methodology (often linked with DevSecOps) for making software that incorporates a lot of security into every stage of the software development life cycle (SDLC).

Learn more about  Secure software development  from

brainly.com/question/26135704

#SPJ1

You might be interested in
Which of the following are actions a programmer could take when debugging a segment of code that would most likely lead to findi
Verizon [17]

Answer:

Option B and C are the correct answer for the above question

Explanation:

The above question asked about the work of the programmer to catch an error of the program--

  • Then the option B states that the programmer needs to prints the value of the various program variable on every line of the program which is the correct solution because it is used to find the error easily. It defines the value of every variable in every place of the program and the programmer caught the error statement in the program if anywhere the variable gets the false value.
  • The C option states to help from a friend, it is also a good solution because the friend can easily be caught the error of the program by seeing every line of code.
  • But the other option is not correct because the option A states that the change the name of the variable which is not a result of anything.
  • And the option D states that the code will be retyped again which is also not justify anything.

6 0
3 years ago
National Public Radio is controlled by a combination of government, corporate sponsorship, and individual donations.
Shkiper50 [21]

so what's the question?

4 0
3 years ago
Read 2 more answers
which type of group found in server 2008 is used to provide access to resources for all users and guests​
evablogger [386]

Answer:

Everyone

Explanation:

There are various types of groups found on the server 2008, and everyone is one out of them. Here we are required to provide them access to the resources to all the users as well as the guests. And hence, we need to provide all the access to the resources. Thus, the correct option here is certainly everyone, which is an option available in the server 2008.

5 0
4 years ago
For each entity, select the attribute that could be the unique identifier of each entity.
Alika [10]

Answer:

"student ID, number and title" is the correct answer for the above question.

Explanation:

  • The primary key is used to read the data of a table. It can not be duplicated or null for any records.
  • The "student ID" is used to identify the data of the "student" entity. It is because the "student ID" can not be duplicated or null for any records. It is because every student has a unique "student ID".
  • The "number" is used to identify the data of the "Locker" entity. It is because the "number" can not be null or duplicate for any records. It is because every locker has a unique "number".
  • The "title" is used to identify the data of the "Movie" entity. It is because the "title" can not be Null or duplicate for any records. It is because every movie has a unique "title".
3 0
3 years ago
The name of the unique identifier assigned to a personal computer
My name is Ann [436]
That would be your username example: makastor.pc.home
6 0
4 years ago
Other questions:
  • When you right-click a spreadsheet object, what command should you select to activate the sheet?
    6·2 answers
  • The benefits of flextime include:
    11·2 answers
  • Editing tool for quickly making a repeated change throughout a document
    14·1 answer
  • Why do you think that backlighting is used in so much of Sheldon’s photography?
    7·2 answers
  • Which of the following Power BI tools is best suited for editing data before import?
    10·1 answer
  • Mention five of the format tools use to edit a picture in a word document<br>​
    13·1 answer
  • What is the solution to the equation ?
    8·2 answers
  • You can filter the data based on certain specific conditions in Excel 2013 true or false​
    8·1 answer
  • I will make you brainless just answer all this question!!​
    14·1 answer
  • HELP QUICK!!!!!!!
    15·1 answer
Add answer
Login
Not registered? Fast signup
Signup
Login Signup
Ask question!