Security-aware systems applications and software development methods / [edited by] Khaled M. Khan.
نوع المادة : نصالناشر:Hershey, PA : Information Science Reference, [2012]تاريخ حقوق النشر: copyright 2012وصف:xxvii, 388 pages : illustrations ; 29 cmنوع المحتوى:- text
- unmediated
- volume
- 9781466615809 (hardcover)
- 146661580X (hardcover)
- 9781466615816 (ebook)
- 1466615818 (ebook)
- 9781466615823 (print & perpetual access)
- 1466615826 (print & perpetual access)
- TK5105.59 .S43924 2012
نوع المادة | المكتبة الحالية | رقم الطلب | رقم النسخة | حالة | تاريخ الإستحقاق | الباركود | |
---|---|---|---|---|---|---|---|
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .S43924 2012 (إستعراض الرف(يفتح أدناه)) | C.1 | Library Use Only | داخل المكتبة فقط | 30010011138078 | ||
كتاب | UAE Federation Library | مكتبة اتحاد الإمارات General Collection | المجموعات العامة | TK5105.59 .S43924 2012 (إستعراض الرف(يفتح أدناه)) | C.2 | المتاح | 30010011138079 |
Browsing UAE Federation Library | مكتبة اتحاد الإمارات shelves, Shelving location: General Collection | المجموعات العامة إغلاق مستعرض الرف(يخفي مستعرض الرف)
"Premier reference source"--Cover.
Includes bibliographical references and index.
"This book facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices"--Provided by publisher.
Agile Software Development: The Straight and Narrow Path to Secure Software? -- Assimilating and Optimizing Software Assurance in the SDLC: A Framework and Step-Wise Approach -- Towards Designing E-Services that Protect Privacy -- Software Engineering Security Based on Business Process Modeling -- Integrating Access Control into UML for Secure Software Modeling and Analysis -- Benefits and Challenges in the Use of Case Studies for Security Requirements Engineering Methods -- Security Requirements Engineering for Evolving Software Systems: A Survey -- Monitoring Buffer Overflow Attacks: A Perennial Task -- CONFU: Configuration Fuzzing Testing Framework for Software Vulnerability Detection -- Retrofitting Existing Web Applications with Effective Dynamic Protection Against SQL Injection Attacks -- Improving Memory Management Security for C and C++ -- Katana: Towards Patching as a Runtime Part of the Compiler-Linker-Loader Toolchain -- A Formal Approach for Securing XML Document -- A Tool Support for Secure Software Integration -- Towards Tool-Support for Usable Secure Requirements Engineering with CAIRIS -- Secure Software Education: A Contextual Model-Based Approach -- Development of a Master of Software Assurance Reference Curriculum -- A Rigorous Approach to the Definition of an International Vocational Master's Degree in Information Security Management.