Security-aware systems applications and software development methods / [edited by] Khaled M. Khan.
Material type:
TextPublication details: Hershey, PA : Information Science Reference, c2012.Description: xxvii, 388 p. : ill. ; 29 cmContent type: - text
- unmediated
- volume
- 9781466615809 (hardcover)
- 9781466615816 (ebook)
- 9781466615823 (print & perpetual access)
- 005.8 23 S
- TK5105.59 .S43924 2012
| Item type | Current library | Collection | Call number | Copy number | Status | Date due | Barcode | |
|---|---|---|---|---|---|---|---|---|
Books
|
Main library A2 | Computers & Information Technology ( Computer Science ) | 005.8 S (Browse shelf(Opens below)) | 1 | Available | 00009661 |
"Premier reference source"--Cover.
Includes bibliographical references and index.
Title
Copyright Page
Editorial Advisory Board
Table of Contents
Detailed Table of Contents
Preface
Section 1
Agile Software Development
Assimilating and Optimizing Software Assurance in the SDLC
Towards Designing E-Services that Protect Privacy
Section 2
Software Engineering Security Based on Business Process Modeling
Integrating Access Control into UML for Secure Software Modeling and Analysis
Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods
Security Requirements Engineering for Evolving Software Systems
Section 3
Monitoring Buffer Overflow Attacks
CONFU
Section 4
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attac
Improving Memory Management Security for C and C++
Katana
A Formal Approach for Securing XML Document
Section 5
A Tool Support for Secure Software Integration
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS
Section 6
Secure Software Education
Development of a Master of Software Assurance Reference Curriculum
A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Informatio
Compilation of References
About the Contributors
Index
"This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher.
There are no comments on this title.