MARC details
| 000 -LEADER |
| fixed length control field |
02609cam a2200361 i 4500 |
| 001 - CONTROL NUMBER |
| control field |
17175158 |
| 005 - DATE AND TIME OF LATEST TRANSACTION |
| control field |
20210427101618.0 |
| 008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
| fixed length control field |
120221s2012 paua b 001 0 eng |
| 010 ## - LIBRARY OF CONGRESS CONTROL NUMBER |
| LC control number |
2012002105 |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781466615809 (hardcover) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781466615816 (ebook) |
| 020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
| International Standard Book Number |
9781466615823 (print & perpetual access) |
| 040 ## - CATALOGING SOURCE |
| Original cataloging agency |
DLC |
| Transcribing agency |
DLC |
| Modifying agency |
DLC |
| Description conventions |
rda |
| 050 00 - LIBRARY OF CONGRESS CALL NUMBER |
| Classification number |
TK5105.59 |
| Item number |
.S43924 2012 |
| 082 00 - DEWEY DECIMAL CLASSIFICATION NUMBER |
| Classification number |
005.8 |
| Edition number |
23 |
| Item number |
S |
| 245 00 - TITLE STATEMENT |
| Title |
Security-aware systems applications and software development methods / |
| Statement of responsibility, etc |
[edited by] Khaled M. Khan. |
| 260 ## - PUBLICATION, DISTRIBUTION, ETC. (IMPRINT) |
| Place of publication, distribution, etc |
Hershey, PA : |
| Name of publisher, distributor, etc |
Information Science Reference, |
| Date of publication, distribution, etc |
c2012. |
| 300 ## - PHYSICAL DESCRIPTION |
| Extent |
xxvii, 388 p. : |
| Other physical details |
ill. ; |
| Dimensions |
29 cm. |
| 336 ## - CONTENT TYPE |
| Source |
rdacontent |
| Content type term |
text |
| 337 ## - MEDIA TYPE |
| Source |
rdamedia |
| Media type term |
unmediated |
| 338 ## - CARRIER TYPE |
| Source |
rdacarrier |
| Carrier type term |
volume |
| 500 ## - GENERAL NOTE |
| General note |
"Premier reference source"--Cover. |
| 504 ## - BIBLIOGRAPHY, ETC. NOTE |
| Bibliography, etc |
Includes bibliographical references and index. |
| 505 0# - FORMATTED CONTENTS NOTE |
| Formatted contents note |
Title<br/>Copyright Page<br/>Editorial Advisory Board<br/>Table of Contents<br/>Detailed Table of Contents<br/>Preface<br/>Section 1<br/>Agile Software Development<br/>Assimilating and Optimizing Software Assurance in the SDLC<br/>Towards Designing E-Services that Protect Privacy<br/>Section 2<br/>Software Engineering Security Based on Business Process Modeling<br/>Integrating Access Control into UML for Secure Software Modeling and Analysis<br/>Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods<br/>Security Requirements Engineering for Evolving Software Systems<br/>Section 3<br/>Monitoring Buffer Overflow Attacks<br/>CONFU<br/>Section 4<br/>Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attac<br/>Improving Memory Management Security for C and C++<br/>Katana<br/>A Formal Approach for Securing XML Document<br/>Section 5<br/>A Tool Support for Secure Software Integration<br/>Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS<br/>Section 6<br/>Secure Software Education<br/>Development of a Master of Software Assurance Reference Curriculum<br/>A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Informatio<br/>Compilation of References<br/>About the Contributors<br/>Index |
| 520 ## - SUMMARY, ETC. |
| Summary, etc |
"This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer networks |
| General subdivision |
Security measures. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer software |
| General subdivision |
Development. |
| 650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
| Topical term or geographic name as entry element |
Computer security. |
| 700 1# - ADDED ENTRY--PERSONAL NAME |
| Personal name |
Khan, Khaled M., |
| Dates associated with a name |
1959- |
| 942 ## - ADDED ENTRY ELEMENTS (KOHA) |
| Koha item type |
Books |
| Source of classification or shelving scheme |
Dewey Decimal Classification |