|
|
|
|
LEADER |
03799nam a2200505 a 4500 |
001 |
30186 |
003 |
IGIG |
005 |
20121117141605.0 |
006 |
m e d |
007 |
cr bn||||m|||a |
008 |
121114s2013 pau fob 000 0 eng d |
010 |
# |
# |
|z 2012023337
|
020 |
# |
# |
|a 9781466624832 (ebook)
|
020 |
# |
# |
|z 9781466624825 (hardcover)
|
024 |
7 |
# |
|a 10.4018/978-1-4666-2482-5
|2 doi
|
035 |
# |
# |
|a (CaBNVSL)gtp00553977
|
035 |
# |
# |
|a (OCoLC)818587638
|
040 |
# |
# |
|a CaBNVSL
|c CaBNVSL
|d CaBNVSL
|
050 |
# |
4 |
|a TK5105.59
|b .D48 2013e
|
082 |
0 |
4 |
|a 005.8
|2 23
|
245 |
0 |
0 |
|a Developing and evaluating security-aware software systems
|c Khaled M. Khan, editor.
|h [electronic resource] /
|
260 |
# |
# |
|a Hershey, Pa. :
|b IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA),
|c c2013.
|
300 |
# |
# |
|a electronic texts (308 p.) :
|b digital files.
|
504 |
# |
# |
|a Includes bibliographical references.
|
505 |
0 |
# |
|a Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Fléchais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araújo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
|
506 |
# |
# |
|a Restricted to subscribers or individual electronic text purchasers.
|
520 |
3 |
# |
|a "This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.
|
530 |
# |
# |
|a Also available in print.
|
538 |
# |
# |
|a Mode of access: World Wide Web.
|
588 |
# |
# |
|a Description based on title screen (IGI Global, viewed November 16, 2012).
|
650 |
# |
0 |
|a Computer networks
|x Security measures.
|
650 |
# |
0 |
|a Computer software
|x Development.
|
650 |
# |
0 |
|a Computer security.
|
653 |
# |
# |
|a Dependable systems
|
653 |
# |
# |
|a Global security systems
|
653 |
# |
# |
|a Programming security
|
653 |
# |
# |
|a Secure software integration
|
653 |
# |
# |
|a Service-oriented systems
|
653 |
# |
# |
|a Software assurance
|
653 |
# |
# |
|a Software engineering
|
700 |
1 |
# |
|a Khan, Khaled M.,
|d 1959-
|
710 |
2 |
# |
|a IGI Global.
|
776 |
0 |
# |
|c (Original)
|w (DLC)2012023337
|
776 |
0 |
8 |
|i Print version:
|w (DLC) 2012023337
|z 9781466624825
|z 1466624825
|
856 |
4 |
0 |
|u https://ezaccess.library.uitm.edu.my/login?url=http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
|z View fulltext via EzAccess
|