Pattern and Security Requirements: Engineering-Based Establishment of Security Standards
Gespeichert in:
1. Verfasser: | |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Cham
Springer International Publishing
2015
|
Schlagworte: | |
Online-Zugang: | BTU01 FHA01 FHI01 FHM01 FHN01 FKE01 FLA01 FRO01 UBG01 UBM01 UBR01 UBT01 UBW01 UER01 UPA01 Volltext Inhaltsverzeichnis Abstract |
Beschreibung: | 1 Online-Ressource (XXV, 474 p.) Ill. |
ISBN: | 9783319166643 |
DOI: | 10.1007/978-3-319-16664-3 |
Internformat
MARC
LEADER | 00000nmm a2200000zc 4500 | ||
---|---|---|---|
001 | BV042544501 | ||
003 | DE-604 | ||
005 | 20150520 | ||
007 | cr|uuu---uuuuu | ||
008 | 150506s2015 |||| o||u| ||||||eng d | ||
020 | |a 9783319166643 |c Online |9 978-3-319-16664-3 | ||
024 | 7 | |a 10.1007/978-3-319-16664-3 |2 doi | |
035 | |a (OCoLC)908701602 | ||
035 | |a (DE-599)BVBBV042544501 | ||
040 | |a DE-604 |b ger |e aacr | ||
041 | 0 | |a eng | |
049 | |a DE-355 |a DE-19 |a DE-Aug4 |a DE-M347 |a DE-573 |a DE-859 |a DE-703 |a DE-473 |a DE-29 |a DE-20 |a DE-92 |a DE-634 |a DE-860 |a DE-861 |a DE-739 | ||
082 | 0 | |a 005.8 |2 23 | |
084 | |a ST 277 |0 (DE-625)143643: |2 rvk | ||
100 | 1 | |a Beckers, Kristian |e Verfasser |0 (DE-588)1071238221 |4 aut | |
245 | 1 | 0 | |a Pattern and Security Requirements |b Engineering-Based Establishment of Security Standards |c by Kristian Beckers |
264 | 1 | |a Cham |b Springer International Publishing |c 2015 | |
300 | |a 1 Online-Ressource (XXV, 474 p.) |b Ill. | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
650 | 0 | 7 | |a Informatik |0 (DE-588)4026894-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenschutz |0 (DE-588)4011134-9 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Datenverarbeitung |0 (DE-588)4011152-0 |2 gnd |9 rswk-swf |
650 | 0 | 7 | |a Systemsoftware |0 (DE-588)4121754-8 |2 gnd |9 rswk-swf |
689 | 0 | 0 | |a Informatik |0 (DE-588)4026894-9 |D s |
689 | 0 | 1 | |a Datenschutz |0 (DE-588)4011134-9 |D s |
689 | 0 | 2 | |a Datenverarbeitung |0 (DE-588)4011152-0 |D s |
689 | 0 | 3 | |a Systemsoftware |0 (DE-588)4121754-8 |D s |
689 | 0 | |5 DE-604 | |
776 | 0 | 8 | |i Erscheint auch als |n Druckausgabe |z 978-3-319-16663-6 |
856 | 4 | 0 | |u https://doi.org/10.1007/978-3-319-16664-3 |x Verlag |3 Volltext |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA |3 Inhaltsverzeichnis |
856 | 4 | 2 | |m Springer Fremddatenuebernahme |q application/pdf |u http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |3 Abstract |
912 | |a ZDB-2-SCS | ||
940 | 1 | |q ZDB-2-SCS_2015 | |
999 | |a oai:aleph.bib-bvb.de:BVB01-027978507 | ||
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l BTU01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FHA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FHI01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FHM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FHN01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FKE01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FLA01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l FRO01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UBG01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UBM01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UBR01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UBT01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UBW01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UER01 |p ZDB-2-SCS |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.1007/978-3-319-16664-3 |l UPA01 |p ZDB-2-SCS |x Verlag |3 Volltext |
Datensatz im Suchindex
_version_ | 1804153310113955840 |
---|---|
adam_text | PATTERN AND SECURITY REQUIREMENTS
/ BECKERS, KRISTIAN
: 2015
TABLE OF CONTENTS / INHALTSVERZEICHNIS
FOREWORD
PREFACE
INTRODUCTION
BACKGROUND
THE PEERESS FRAMEWORK
THE CAST METHOD FOR COMPARING SECURITY STANDARDS
RELATING ISO 27001 TO THE CONCEPTUAL FRAMEWORK FOR SECURITY REQUIREMENTS
ENGINEERING METHODS
SUPPORTING ISO 27001 COMPLIANT ISMS ESTABLISHMENT WITH SI*
SUPPORTING ISO 27001 ESTABLISHMENT WITH CORAS
SUPPORTING COMMON CRITERIA SECURITY ANALYSIS WITH PROBLEM FRAMES
SUPPORTING ISO 26262 HAZARD ANALYSIS WITH PROBLEM FRAMES
A CATALOG OF CONTEXT-PATTERNS
INITIATING A PATTERN LANGUAGE FOR CONTEXT-PATTERNS
SUPPORTING THE ESTABLISHMENT OF A CLOUD-SPECIFIC ISMS ACCORDING TO ISO
27001 USING THE CLOUD SYSTEM ANALYSIS PATTERN
VALIDATION AND EXTENSION OF OUR CONTEXT-PATTERN APPROACH
CONCLUSION
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
PATTERN AND SECURITY REQUIREMENTS
/ BECKERS, KRISTIAN
: 2015
ABSTRACT / INHALTSTEXT
SECURITY THREATS ARE A SIGNIFICANT PROBLEM FOR INFORMATION TECHNOLOGY
COMPANIES TODAY. THIS BOOK FOCUSES ON HOW TO MITIGATE THESE THREATS BY
USING SECURITY STANDARDS AND PROVIDES WAYS TO ADDRESS ASSOCIATED
PROBLEMS FACED BY ENGINEERS CAUSED BY AMBIGUITIES IN THE STANDARDS. THE
SECURITY STANDARDS ARE ANALYSED, FUNDAMENTAL CONCEPTS OF THE SECURITY
STANDARDS PRESENTED, AND THE RELATIONS TO THE ELEMENTARY CONCEPTS OF
SECURITY REQUIREMENTS ENGINEERING (SRE) METHODS EXPLORED. USING THIS
KNOWLEDGE, ENGINEERS CAN BUILD CUSTOMISED METHODS THAT SUPPORT THE
ESTABLISHMENT OF SECURITY STANDARDS. STANDARDS SUCH AS COMMON CRITERIA
OR ISO 27001 ARE EXPLORED AND SEVERAL EXTENSIONS ARE PROVIDED TO
WELL-KNOWN SRE METHODS SUCH AS SI*, CORAS, AND UML4PF TO SUPPORT THE
ESTABLISHMENT OF THESE SECURITY STANDARDS. THROUGH CAREFUL ANALYSIS OF
THE ACTIVITIES DEMANDED BY THE STANDARDS, FOR EXAMPLE THE ACTIVITIES TO
ESTABLISH AN INFORMATION SECURITY MANAGEMENT SYSTEM (ISMS) IN COMPLIANCE
WITH THE ISO 27001 STANDARD, METHODS ARE PROPOSED WHICH INCORPORATE
EXISTING SECURITY REQUIREMENT APPROACHES AND PATTERNS. UNDERSTANDING
PATTERN AND SECURITY REQUIREMENTS ENGINEERING METHODS IS IMPORTANT FOR
SOFTWARE ENGINEERS, SECURITY ANALYSTS, AND OTHER PROFESSIONALS THAT ARE
TASKED WITH ESTABLISHING A SECURITY STANDARD, AS WELL AS RESEARCHERS WHO
AIM TO INVESTIGATE THE PROBLEMS WITH ESTABLISHING SECURITY STANDARDS.
THE EXAMPLES AND EXPLANATIONS IN THIS BOOK ARE DESIGNED TO BE
UNDERSTANDABLE BY ALL THESE READERS
DIESES SCHRIFTSTUECK WURDE MASCHINELL ERZEUGT.
|
any_adam_object | 1 |
author | Beckers, Kristian |
author_GND | (DE-588)1071238221 |
author_facet | Beckers, Kristian |
author_role | aut |
author_sort | Beckers, Kristian |
author_variant | k b kb |
building | Verbundindex |
bvnumber | BV042544501 |
classification_rvk | ST 277 |
collection | ZDB-2-SCS |
ctrlnum | (OCoLC)908701602 (DE-599)BVBBV042544501 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.1007/978-3-319-16664-3 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03669nmm a2200649zc 4500</leader><controlfield tag="001">BV042544501</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20150520 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">150506s2015 |||| o||u| ||||||eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9783319166643</subfield><subfield code="c">Online</subfield><subfield code="9">978-3-319-16664-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.1007/978-3-319-16664-3</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)908701602</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV042544501</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">aacr</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-355</subfield><subfield code="a">DE-19</subfield><subfield code="a">DE-Aug4</subfield><subfield code="a">DE-M347</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-859</subfield><subfield code="a">DE-703</subfield><subfield code="a">DE-473</subfield><subfield code="a">DE-29</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-92</subfield><subfield code="a">DE-634</subfield><subfield code="a">DE-860</subfield><subfield code="a">DE-861</subfield><subfield code="a">DE-739</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="084" ind1=" " ind2=" "><subfield code="a">ST 277</subfield><subfield code="0">(DE-625)143643:</subfield><subfield code="2">rvk</subfield></datafield><datafield tag="100" ind1="1" ind2=" "><subfield code="a">Beckers, Kristian</subfield><subfield code="e">Verfasser</subfield><subfield code="0">(DE-588)1071238221</subfield><subfield code="4">aut</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Pattern and Security Requirements</subfield><subfield code="b">Engineering-Based Establishment of Security Standards</subfield><subfield code="c">by Kristian Beckers</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Cham</subfield><subfield code="b">Springer International Publishing</subfield><subfield code="c">2015</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (XXV, 474 p.)</subfield><subfield code="b">Ill.</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">Systemsoftware</subfield><subfield code="0">(DE-588)4121754-8</subfield><subfield code="2">gnd</subfield><subfield code="9">rswk-swf</subfield></datafield><datafield tag="689" ind1="0" ind2="0"><subfield code="a">Informatik</subfield><subfield code="0">(DE-588)4026894-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="1"><subfield code="a">Datenschutz</subfield><subfield code="0">(DE-588)4011134-9</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="2"><subfield code="a">Datenverarbeitung</subfield><subfield code="0">(DE-588)4011152-0</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2="3"><subfield code="a">Systemsoftware</subfield><subfield code="0">(DE-588)4121754-8</subfield><subfield code="D">s</subfield></datafield><datafield tag="689" ind1="0" ind2=" "><subfield code="5">DE-604</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druckausgabe</subfield><subfield code="z">978-3-319-16663-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Inhaltsverzeichnis</subfield></datafield><datafield tag="856" ind1="4" ind2="2"><subfield code="m">Springer Fremddatenuebernahme</subfield><subfield code="q">application/pdf</subfield><subfield code="u">http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA</subfield><subfield code="3">Abstract</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-2-SCS</subfield></datafield><datafield tag="940" ind1="1" ind2=" "><subfield code="q">ZDB-2-SCS_2015</subfield></datafield><datafield tag="999" ind1=" " ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-027978507</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">BTU01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FHA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FHI01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FHM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FHN01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FKE01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FLA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">FRO01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UBG01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UBM01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UBR01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UBT01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UBW01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UER01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.1007/978-3-319-16664-3</subfield><subfield code="l">UPA01</subfield><subfield code="p">ZDB-2-SCS</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV042544501 |
illustrated | Illustrated |
indexdate | 2024-07-10T01:24:34Z |
institution | BVB |
isbn | 9783319166643 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-027978507 |
oclc_num | 908701602 |
open_access_boolean | |
owner | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
owner_facet | DE-355 DE-BY-UBR DE-19 DE-BY-UBM DE-Aug4 DE-M347 DE-573 DE-859 DE-703 DE-473 DE-BY-UBG DE-29 DE-20 DE-92 DE-634 DE-860 DE-861 DE-739 |
physical | 1 Online-Ressource (XXV, 474 p.) Ill. |
psigel | ZDB-2-SCS ZDB-2-SCS_2015 |
publishDate | 2015 |
publishDateSearch | 2015 |
publishDateSort | 2015 |
publisher | Springer International Publishing |
record_format | marc |
spelling | Beckers, Kristian Verfasser (DE-588)1071238221 aut Pattern and Security Requirements Engineering-Based Establishment of Security Standards by Kristian Beckers Cham Springer International Publishing 2015 1 Online-Ressource (XXV, 474 p.) Ill. txt rdacontent c rdamedia cr rdacarrier Informatik (DE-588)4026894-9 gnd rswk-swf Datenschutz (DE-588)4011134-9 gnd rswk-swf Datenverarbeitung (DE-588)4011152-0 gnd rswk-swf Systemsoftware (DE-588)4121754-8 gnd rswk-swf Informatik (DE-588)4026894-9 s Datenschutz (DE-588)4011134-9 s Datenverarbeitung (DE-588)4011152-0 s Systemsoftware (DE-588)4121754-8 s DE-604 Erscheint auch als Druckausgabe 978-3-319-16663-6 https://doi.org/10.1007/978-3-319-16664-3 Verlag Volltext Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA Inhaltsverzeichnis Springer Fremddatenuebernahme application/pdf http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA Abstract |
spellingShingle | Beckers, Kristian Pattern and Security Requirements Engineering-Based Establishment of Security Standards Informatik (DE-588)4026894-9 gnd Datenschutz (DE-588)4011134-9 gnd Datenverarbeitung (DE-588)4011152-0 gnd Systemsoftware (DE-588)4121754-8 gnd |
subject_GND | (DE-588)4026894-9 (DE-588)4011134-9 (DE-588)4011152-0 (DE-588)4121754-8 |
title | Pattern and Security Requirements Engineering-Based Establishment of Security Standards |
title_auth | Pattern and Security Requirements Engineering-Based Establishment of Security Standards |
title_exact_search | Pattern and Security Requirements Engineering-Based Establishment of Security Standards |
title_full | Pattern and Security Requirements Engineering-Based Establishment of Security Standards by Kristian Beckers |
title_fullStr | Pattern and Security Requirements Engineering-Based Establishment of Security Standards by Kristian Beckers |
title_full_unstemmed | Pattern and Security Requirements Engineering-Based Establishment of Security Standards by Kristian Beckers |
title_short | Pattern and Security Requirements |
title_sort | pattern and security requirements engineering based establishment of security standards |
title_sub | Engineering-Based Establishment of Security Standards |
topic | Informatik (DE-588)4026894-9 gnd Datenschutz (DE-588)4011134-9 gnd Datenverarbeitung (DE-588)4011152-0 gnd Systemsoftware (DE-588)4121754-8 gnd |
topic_facet | Informatik Datenschutz Datenverarbeitung Systemsoftware |
url | https://doi.org/10.1007/978-3-319-16664-3 http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000001&line_number=0001&func_code=DB_RECORDS&service_type=MEDIA http://bvbr.bib-bvb.de:8991/F?func=service&doc_library=BVB01&local_base=BVB01&doc_number=027978507&sequence=000003&line_number=0002&func_code=DB_RECORDS&service_type=MEDIA |
work_keys_str_mv | AT beckerskristian patternandsecurityrequirementsengineeringbasedestablishmentofsecuritystandards |