| 000 | 02609cam a2200361 i 4500 | ||
|---|---|---|---|
| 999 |
_c7298 _d7298 |
||
| 001 | 17175158 | ||
| 005 | 20210427101618.0 | ||
| 008 | 120221s2012 paua b 001 0 eng | ||
| 010 | _a 2012002105 | ||
| 020 | _a9781466615809 (hardcover) | ||
| 020 | _a9781466615816 (ebook) | ||
| 020 | _a9781466615823 (print & perpetual access) | ||
| 040 |
_aDLC _cDLC _dDLC _erda |
||
| 050 | 0 | 0 |
_aTK5105.59 _b.S43924 2012 |
| 082 | 0 | 0 |
_a005.8 _223 _bS |
| 245 | 0 | 0 |
_aSecurity-aware systems applications and software development methods / _c[edited by] Khaled M. Khan. |
| 260 |
_aHershey, PA : _bInformation Science Reference, _cc2012. |
||
| 300 |
_axxvii, 388 p. : _bill. ; _c29 cm. |
||
| 336 |
_2rdacontent _atext |
||
| 337 |
_2rdamedia _aunmediated |
||
| 338 |
_2rdacarrier _avolume |
||
| 500 | _a"Premier reference source"--Cover. | ||
| 504 | _aIncludes bibliographical references and index. | ||
| 505 | 0 | _aTitle Copyright Page Editorial Advisory Board Table of Contents Detailed Table of Contents Preface Section 1 Agile Software Development Assimilating and Optimizing Software Assurance in the SDLC Towards Designing E-Services that Protect Privacy Section 2 Software Engineering Security Based on Business Process Modeling Integrating Access Control into UML for Secure Software Modeling and Analysis Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods Security Requirements Engineering for Evolving Software Systems Section 3 Monitoring Buffer Overflow Attacks CONFU Section 4 Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attac Improving Memory Management Security for C and C++ Katana A Formal Approach for Securing XML Document Section 5 A Tool Support for Secure Software Integration Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS Section 6 Secure Software Education Development of a Master of Software Assurance Reference Curriculum A Rigorous Approach to the Definition of an International Vocational Master’s Degree in Informatio Compilation of References About the Contributors Index | |
| 520 | _a"This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher. | ||
| 650 | 0 |
_aComputer networks _xSecurity measures. |
|
| 650 | 0 |
_aComputer software _xDevelopment. |
|
| 650 | 0 | _aComputer security. | |
| 700 | 1 |
_aKhan, Khaled M., _d1959- |
|
| 942 |
_cBK _2ddc |
||