語系/ Language:
繁體中文
English
KMU OLIS
登入
回首頁
切換:
標籤
|
MARC模式
|
ISBD
Developing and evaluating security-a...
~
IGI Global.
Developing and evaluating security-aware software systems
紀錄類型:
書目-語言資料,印刷品 : 單行本
其他作者:
KhanKhaled M., 1959-
其他團體作者:
IGI Global.
出版地:
Hershey, Pa.
出版者:
IGI Global;
出版年:
c2013.
面頁冊數:
electronic texts (308 p.)digital files. :
標題:
Computer security. -
標題:
Computer software - Development. -
標題:
Computer networks - Security measures. -
標題:
Dependable systems
標題:
Global security systems
標題:
Programming security
標題:
Secure software integration
標題:
Service-oriented systems
標題:
Software assurance
標題:
Software engineering
電子資源:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
附註:
Restricted to subscribers or individual electronic text purchasers.
摘要註:
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
ISBN:
9781466624832
內容註:
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang Building secure software using XP / Walid Al-Ahmad Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
Developing and evaluating security-aware software systems
Developing and evaluating security-aware software systems
/ Khaled M. Khan, editor. - Hershey, Pa. : IGI Global, c2013.. - electronic texts (308 p.) ; digital files..
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang.
Restricted to subscribers or individual electronic text purchasers..
Includes bibliographical references..
ISBN 9781466624832ISBN 9781466624825
Computer security.Computer softwareComputer networks -- Development. -- Security measures.
Dependable systemsGlobal security systemsProgramming securitySecure software integrationService-oriented systemsSoftware assuranceSoftware engineering
Khan, Khaled M.
Developing and evaluating security-aware software systems
LDR
:03404nam a2200433 450
001
288633
005
20121117141605.0
009
a(CaBNVSL)gtp00553977
009
a(OCoLC)818587638
009
00000202
010
1
$a
9781466624832
$b
ebook
010
1
$a
9781466624825
$b
hardcover
012
0
$a
10.4018/978-1-4666-2482-5
020
$b
2012023337
100
$a
20151127d2013 y0engy50 b
102
$a
us
105
$a
y a 000yy
200
1
$a
Developing and evaluating security-aware software systems
$f
Khaled M. Khan, editor.
204
1
$a
electronic resource
210
$a
Hershey, Pa.
$c
IGI Global
$b
701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA
$d
c2013.
215
1
$a
electronic texts (308 p.)
$c
digital files.
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-2482-5
310
$a
Also available in print.
320
$a
Includes bibliographical references.
327
1
$a
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang
$a
Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz
$a
Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais
$a
Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.]
$a
Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun
$a
Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira
$a
Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.]
$a
Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan
$a
A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang
$a
Building secure software using XP / Walid Al-Ahmad
$a
Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov
$a
Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid
$a
JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.]
$a
A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl
$a
Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
330
$a
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2012023337
452
1
$1
300
$a
Print version:
$1
001(DLC) 2012023337
$1
0101
$a
1466624825; 9781466624825
606
$a
Computer security.
$3
63991
606
$a
Computer software
$x
Development.
$2
fast
$3
383479
606
$a
Computer networks
$x
Security measures.
$2
lc
$3
385022
610
1
$a
Dependable systems
610
1
$a
Global security systems
610
1
$a
Programming security
610
1
$a
Secure software integration
610
1
$a
Service-oriented systems
610
1
$a
Software assurance
610
1
$a
Software engineering
676
$a
005.8
$v
23
680
$a
TK5105.59
$b
.D48 2013e
702
1
$a
Khan
$b
Khaled M.
$f
1959-
$3
385021
712
0 2
$a
IGI Global.
$3
384528
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
筆 0 讀者評論
多媒體
評論
新增評論
分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
處理中
...
變更密碼
登入