語系/ Language: 繁體中文

Developing and evaluating security-a...
IGI Global.

 

  • Developing and evaluating security-aware software systems
  • 紀錄類型: 書目-語言資料,印刷品 : 單行本
    其他作者: KhanKhaled M., 1959-
    其他團體作者: IGI Global.
    出版地: Hershey, Pa.
    出版者: IGI Global;
    出版年: c2013.
    面頁冊數: electronic texts (308 p.)digital files. :
    標題: Computer security. -
    標題: Computer software - Development. -
    標題: Computer networks - Security measures. -
    標題: Dependable systems
    標題: Global security systems
    標題: Programming security
    標題: Secure software integration
    標題: Service-oriented systems
    標題: Software assurance
    標題: Software engineering
    電子資源: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
    附註: Restricted to subscribers or individual electronic text purchasers.
    摘要註: "This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
    ISBN: 9781466624832
    內容註: Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang Building secure software using XP / Walid Al-Ahmad Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
多媒體
評論
  • 新增評論 分享你的心得,請勿在此評論區張貼涉及人身攻擊、情緒謾罵、或內容涉及非法的不當言論,館方有權利刪除任何違反評論規則之發言,情節嚴重者一律停權,以維護所有讀者的自由言論空間。
Export
取書館別
 
 
變更密碼
登入