Ramdan Hours:
Sun - Thu
9.30 AM - 2.30 PM
Iftar in --:--:--
🌙 Maghrib: --:--
Image from Google Jackets

Security-aware systems applications and software development methods / [edited by] Khaled M. Khan.

Contributor(s): Material type: TextTextPublication details: Hershey, PA : Information Science Reference, c2012.Description: xxvii, 388 p. : ill. ; 29 cmContent type:
  • text
Media type:
  • unmediated
Carrier type:
  • volume
ISBN:
  • 9781466615809 (hardcover)
  • 9781466615816 (ebook)
  • 9781466615823 (print & perpetual access)
Subject(s): DDC classification:
  • 005.8 23 S
LOC classification:
  • TK5105.59 .S43924 2012
Contents:
Title Copyright Page Editorial Advisory Board Table of Contents Detailed Table of Contents Preface Section 1 Agile Software Development Assimilating and Optimizing Software Assurance in the SDLC Towards Designing E-Services that Protect Privacy Section 2 Software Engineering Security Based on Business Process Modeling Integrating Access Control into UML for Secure Software Modeling and Analysis Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods Security Requirements Engineering for Evolving Software Systems Section 3 Monitoring Buffer Overflow Attacks CONFU Section 4 Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attac Improving Memory Management Security for C and C++ Katana A Formal Approach for Securing XML Document Section 5 A Tool Support for Secure Software Integration Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS Section 6 Secure Software Education Development of a Master of Software Assurance Reference Curriculum A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Informatio Compilation of References About the Contributors Index
Summary: "This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher.
Star ratings
    Average rating: 0.0 (0 votes)
Holdings
Item type Current library Collection Call number Copy number Status Date due Barcode
Books Books Main library A2 Computers & Information Technology ( Computer Science ) 005.8 S (Browse shelf(Opens below)) 1 Available 00009661

"Premier reference source"--Cover.

Includes bibliographical references and index.

Title
Copyright Page
Editorial Advisory Board
Table of Contents
Detailed Table of Contents
Preface
Section 1
Agile Software Development
Assimilating and Optimizing Software Assurance in the SDLC
Towards Designing E-Services that Protect Privacy
Section 2
Software Engineering Security Based on Business Process Modeling
Integrating Access Control into UML for Secure Software Modeling and Analysis
Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods
Security Requirements Engineering for Evolving Software Systems
Section 3
Monitoring Buffer Overflow Attacks
CONFU
Section 4
Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attac
Improving Memory Management Security for C and C++
Katana
A Formal Approach for Securing XML Document
Section 5
A Tool Support for Secure Software Integration
Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS
Section 6
Secure Software Education
Development of a Master of Software Assurance Reference Curriculum
A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Informatio
Compilation of References
About the Contributors
Index

"This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher.

There are no comments on this title.

to post a comment.
Share