|
|
|
|
LEADER |
04413nam a2200565 a 4500 |
001 |
19620 |
003 |
IGIG |
005 |
20120425130521.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
120423s2012 pau fsb 000 0 eng d |
010 |
# |
# |
|z 2012002105
|
020 |
# |
# |
|a 9781466615816 (ebook)
|
020 |
# |
# |
|z 9781466615809 (hardcover)
|
020 |
# |
# |
|z 9781466615823 (print & perpetual access)
|
024 |
7 |
# |
|a 10.4018/978-1-4666-1580-9
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00551587
|
035 |
# |
# |
|a (OCoLC)807847249
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK5105.59
|b .S43924 2012e
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Security-aware systems applications and software development methods
|c Khaled M. Khan, editor.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c 2012.
|
300 |
# |
# |
|a electronic texts (343 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a 1. Agile software development: the straight and narrow path to secure software? / Torstein Nicolaysen ... [et al.] -- 2. Assimilating and optimizing software assurance in the SDLC: a framework and step-wise approach / Aderemi O. Adeniji, Seok-Won Lee -- 3. Towards designing e-services that protect privacy / George O. M. Yee -- 4. Software engineering security based on business process modeling / Joseph Barjis -- 5. Integrating access control into UML for secure software modeling and analysis / Thuong Doan ... [et al.] -- 6. Benefits and challenges in the use of case studies for security requirements engineering methods / Nancy R. Mead -- 7. Security requirements engineering for evolving software systems: a survey / Armstrong Nhlabatsi, Bashar Nuseibeh, Yijun Yu -- 8. Monitoring buffer overflow attacks: a perennial task / Hossain Shahriar, Mohammad Zulkernine -- 9. CONFU: configuration fuzzing testing framework for software vulnerability detection / Huning Dai, Christian Murphy, Gail E. Kaiser -- 10. Retrofitting existing web applications with effective dynamic protection against SQL injection attacks / San-Tsai Sun, Konstantin Beznosov -- 11. Improving memory management security for C and C++ / Yves Younan ... [et al.] -- 12. Katana: towards patching as a runtime part of the compiler-linker-loader toolchain / Sergey Bratus ... [et al.] -- 13. A formal approach for securing XML document / Yun Bai -- 14. A tool support for secure software integration / Khaled M. Khan, Jun Han -- 15. Towards tool-support for usable secure requirements engineering with CAIRIS / Shamal Faily, Ivan Fléchais -- 16. Secure software education: a contextual model-based approach / J. J. Simpson ... [et al.] -- 17. Development of a master of software assurance reference curriculum / Nancy R. Mead ... [et al.] -- 18. A rigorous approach to the definition of an international vocational master's degree in information security management / Frédéric Girard ... [et al.].
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed April 22, 2012).
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Computer software
|x Development.
|
650 |
# |
0 |
|a Computer security.
|
653 |
# |
# |
|a Aspect-oriented software development
|
653 |
# |
# |
|a Dependable systems
|
653 |
# |
# |
|a Process of building secure software
|
653 |
# |
# |
|a Secure deployment of software applications
|
653 |
# |
# |
|a Security assurances, standards, and policies
|
653 |
# |
# |
|a Security audit and control
|
653 |
# |
# |
|a Security in software architecture and design
|
653 |
# |
# |
|a Security requirements engineering
|
653 |
# |
# |
|a Curriculum design
|
653 |
# |
# |
|a Privacy protection
|
700 |
1 |
# |
|a Khan, Khaled M.,
|d 1959-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2012002105
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2012002105
|z 9781466615809
|z 146661580X
|
856 |
4 |
1 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-1580-9
|3 Chapter PDFs via platform:
|