Language:
English
繁體中文
KMU OLIS
Login
Back
Switch To:
Labeled
|
MARC Mode
|
ISBD
Developing and evaluating security-a...
~
IGI Global.
Developing and evaluating security-aware software systems
Record Type:
Language materials, printed : monographic
Secondary Intellectual Responsibility:
KhanKhaled M., 1959-
Secondary Intellectual Responsibility:
IGI Global.
Place of Publication:
Hershey, Pa.
Published:
IGI Global;
Year of Publication:
c2013.
Description:
electronic texts (308 p.)digital files. :
Subject:
Computer security. -
Subject:
Computer software - Development. -
Subject:
Computer networks - Security measures. -
Subject:
Dependable systems
Subject:
Global security systems
Subject:
Programming security
Subject:
Secure software integration
Subject:
Service-oriented systems
Subject:
Software assurance
Subject:
Software engineering
Online resource:
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
Notes:
Restricted to subscribers or individual electronic text purchasers.
Summary:
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
ISBN:
9781466624832
Content Note:
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang Building secure software using XP / Walid Al-Ahmad Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
Developing and evaluating security-aware software systems
Developing and evaluating security-aware software systems
/ Khaled M. Khan, editor. - Hershey, Pa. : IGI Global, c2013.. - electronic texts (308 p.) ; digital files..
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang.
Restricted to subscribers or individual electronic text purchasers..
Includes bibliographical references..
ISBN 9781466624832ISBN 9781466624825
Computer security.Computer softwareComputer networks -- Development. -- Security measures.
Dependable systemsGlobal security systemsProgramming securitySecure software integrationService-oriented systemsSoftware assuranceSoftware engineering
Khan, Khaled M.
Developing and evaluating security-aware software systems
LDR
:03404nam a2200433 450
001
288633
005
20121117141605.0
009
a(CaBNVSL)gtp00553977
009
a(OCoLC)818587638
009
00000202
010
1
$a
9781466624832
$b
ebook
010
1
$a
9781466624825
$b
hardcover
012
0
$a
10.4018/978-1-4666-2482-5
020
$b
2012023337
100
$a
20151127d2013 y0engy50 b
102
$a
us
105
$a
y a 000yy
200
1
$a
Developing and evaluating security-aware software systems
$f
Khaled M. Khan, editor.
204
1
$a
electronic resource
210
$a
Hershey, Pa.
$c
IGI Global
$b
701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA
$d
c2013.
215
1
$a
electronic texts (308 p.)
$c
digital files.
300
$a
Restricted to subscribers or individual electronic text purchasers.
301
$a
10.4018/978-1-4666-2482-5
310
$a
Also available in print.
320
$a
Includes bibliographical references.
327
1
$a
Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang
$a
Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz
$a
Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais
$a
Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.]
$a
Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun
$a
Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira
$a
Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.]
$a
Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan
$a
A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang
$a
Building secure software using XP / Walid Al-Ahmad
$a
Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov
$a
Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid
$a
JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.]
$a
A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl
$a
Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
330
$a
"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
337
$a
Mode of access: World Wide Web.
452
1
$1
001(DLC)2012023337
452
1
$1
300
$a
Print version:
$1
001(DLC) 2012023337
$1
0101
$a
1466624825; 9781466624825
606
$a
Computer security.
$3
63991
606
$a
Computer software
$x
Development.
$2
fast
$3
383479
606
$a
Computer networks
$x
Security measures.
$2
lc
$3
385022
610
1
$a
Dependable systems
610
1
$a
Global security systems
610
1
$a
Programming security
610
1
$a
Secure software integration
610
1
$a
Service-oriented systems
610
1
$a
Software assurance
610
1
$a
Software engineering
676
$a
005.8
$v
23
680
$a
TK5105.59
$b
.D48 2013e
702
1
$a
Khan
$b
Khaled M.
$f
1959-
$3
385021
712
0 2
$a
IGI Global.
$3
384528
856
7
$2
http
$3
Chapter PDFs via platform
$u
http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
based on 0 review(s)
Multimedia
Reviews
Add a review
and share your thoughts with other readers
Export
pickup library
Processing
...
Change password
Login