Security-aware systems applications and software development methods

"This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher.

Bibliographic Details
Corporate Author: IGI Global.
Other Authors: Khan, Khaled M., 1959-
Format: Electronic
Language:English
Published: Hershey, Pa. : IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), 2012.
Subjects:
Online Access:Chapter PDFs via platform:
LEADER 04413nam a2200565 a 4500
001 19620
003 IGIG
005 20120425130521.0
006 m e d
007 cr bn||||m|||a
008 120423s2012 pau fsb 000 0 eng d
010 # # |z 2012002105 
020 # # |a 9781466615816 (ebook) 
020 # # |z 9781466615809 (hardcover) 
020 # # |z 9781466615823 (print & perpetual access) 
024 7 # |a 10.4018/978-1-4666-1580-9  |2 doi 
035 # # |a (CaBNVSL)gtp00551587 
035 # # |a (OCoLC)807847249 
040 # # |a CaBNVSL  |c CaBNVSL  |d CaBNVSL 
050 # 4 |a TK5105.59  |b .S43924 2012e 
082 0 4 |a 005.8  |2 23 
245 0 0 |a Security-aware systems applications and software development methods  |c Khaled M. Khan, editor.  |h [electronic resource] / 
260 # # |a Hershey, Pa. :  |b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),  |c 2012. 
300 # # |a electronic texts (343 p.) :  |b digital files. 
504 # # |a Includes bibliographical references. 
505 0 # |a 1. Agile software development: the straight and narrow path to secure software? / Torstein Nicolaysen ... [et al.] -- 2. Assimilating and optimizing software assurance in the SDLC: a framework and step-wise approach / Aderemi O. Adeniji, Seok-Won Lee -- 3. Towards designing e-services that protect privacy / George O. M. Yee -- 4. Software engineering security based on business process modeling / Joseph Barjis -- 5. Integrating access control into UML for secure software modeling and analysis / Thuong Doan ... [et al.] -- 6. Benefits and challenges in the use of case studies for security requirements engineering methods / Nancy R. Mead -- 7. Security requirements engineering for evolving software systems: a survey / Armstrong Nhlabatsi, Bashar Nuseibeh, Yijun Yu -- 8. Monitoring buffer overflow attacks: a perennial task / Hossain Shahriar, Mohammad Zulkernine -- 9. CONFU: configuration fuzzing testing framework for software vulnerability detection / Huning Dai, Christian Murphy, Gail E. Kaiser -- 10. Retrofitting existing web applications with effective dynamic protection against SQL injection attacks / San-Tsai Sun, Konstantin Beznosov -- 11. Improving memory management security for C and C++ / Yves Younan ... [et al.] -- 12. Katana: towards patching as a runtime part of the compiler-linker-loader toolchain / Sergey Bratus ... [et al.] -- 13. A formal approach for securing XML document / Yun Bai -- 14. A tool support for secure software integration / Khaled M. Khan, Jun Han -- 15. Towards tool-support for usable secure requirements engineering with CAIRIS / Shamal Faily, Ivan Fléchais -- 16. Secure software education: a contextual model-based approach / J. J. Simpson ... [et al.] -- 17. Development of a master of software assurance reference curriculum / Nancy R. Mead ... [et al.] -- 18. A rigorous approach to the definition of an international vocational master's degree in information security management / Frédéric Girard ... [et al.]. 
506 # # |a Restricted to subscribers or individual electronic text purchasers. 
520 3 # |a "This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher. 
530 # # |a Also available in print. 
538 # # |a Mode of access: World Wide Web. 
588 # # |a Description based on title screen (IGI Global, viewed April 22, 2012). 
650 # 0 |a Computer networks  |x Security measures. 
650 # 0 |a Computer software  |x Development. 
650 # 0 |a Computer security. 
653 # # |a Aspect-oriented software development 
653 # # |a Dependable systems 
653 # # |a Process of building secure software 
653 # # |a Secure deployment of software applications 
653 # # |a Security assurances, standards, and policies 
653 # # |a Security audit and control 
653 # # |a Security in software architecture and design 
653 # # |a Security requirements engineering 
653 # # |a Curriculum design 
653 # # |a Privacy protection 
700 1 # |a Khan, Khaled M.,  |d 1959- 
710 2 # |a IGI Global. 
776 0 # |c (Original)  |w (DLC)2012002105 
776 0 8 |i Print version:  |w (DLC) 2012002105  |z 9781466615809  |z 146661580X 
856 4 1 |u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-1580-9  |3 Chapter PDFs via platform: