Software system reliability and security /:
To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering.
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Amsterdam ; Washington, DC :
IOS Press,
©2007.
|
Schriftenreihe: | NATO security through science series. Information and communication security ;
v. 9. |
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering. |
Beschreibung: | 1 online resource (ix, 417 pages :) |
Format: | Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |
Bibliographie: | Includes bibliographical references. |
ISBN: | 9781429492232 1429492236 1433708744 9781433708749 9781607502364 1607502364 |
ISSN: | 1574-5589 ; |
Internformat
MARC
LEADER | 00000cam a2200000 a 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-ocn290589228 | ||
003 | OCoLC | ||
005 | 20240705115654.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 070511s2007 ne a ob 100 0 eng d | ||
040 | |a CaPaEBR |b eng |e pn |c COCUF |d OCLCQ |d N$T |d YDXCP |d IOSPR |d OCLCE |d IDEBK |d OCLCQ |d LYU |d E7B |d OCLCQ |d FVL |d OCLCQ |d MERUC |d EBLCP |d OCLCO |d OCLCQ |d OCLCF |d OCLCQ |d OCLCO |d DEBSZ |d OCLCO |d OCLCQ |d OCLCO |d OCL |d OCLCO |d OCLCQ |d AZK |d AGLDB |d MOR |d PIFBR |d ZCU |d OCLCQ |d U3W |d OCLCA |d BRL |d STF |d WRM |d JBG |d OCLCQ |d VTS |d EZ9 |d ICG |d INT |d VT2 |d OCLCQ |d WYU |d A6Q |d OCLCQ |d DKC |d OCLCQ |d CEF |d M8D |d NLW |d OCLCQ |d UKCRE |d AJS |d OCLCO |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 170931716 |a 171562451 |a 491261860 |a 608476772 |a 632697490 |a 648307892 |a 658630561 |a 722592988 |a 728029223 |a 744987067 |a 814502460 |a 961525785 |a 962592654 |a 974199651 |a 974456569 |a 980278061 |a 981361481 |a 988503593 |a 991584556 |a 992068421 |a 1005640423 |a 1018084014 |a 1037505915 |a 1038684090 |a 1042317894 |a 1047576674 |a 1049142120 |a 1055255708 |a 1055403749 |a 1064045376 |a 1076314245 |a 1081225326 |a 1096480301 |a 1118144670 |a 1121005874 |a 1135961058 |a 1153518688 |a 1159183753 |a 1228582350 | ||
020 | |a 9781429492232 |q (electronic bk.) | ||
020 | |a 1429492236 |q (electronic bk.) | ||
020 | |a 1433708744 | ||
020 | |a 9781433708749 | ||
020 | |a 9781607502364 | ||
020 | |a 1607502364 | ||
020 | |z 9781586037314 |q (hd. bd.) | ||
020 | |z 1586037315 |q (hd. bd.) | ||
035 | |a (OCoLC)290589228 |z (OCoLC)170931716 |z (OCoLC)171562451 |z (OCoLC)491261860 |z (OCoLC)608476772 |z (OCoLC)632697490 |z (OCoLC)648307892 |z (OCoLC)658630561 |z (OCoLC)722592988 |z (OCoLC)728029223 |z (OCoLC)744987067 |z (OCoLC)814502460 |z (OCoLC)961525785 |z (OCoLC)962592654 |z (OCoLC)974199651 |z (OCoLC)974456569 |z (OCoLC)980278061 |z (OCoLC)981361481 |z (OCoLC)988503593 |z (OCoLC)991584556 |z (OCoLC)992068421 |z (OCoLC)1005640423 |z (OCoLC)1018084014 |z (OCoLC)1037505915 |z (OCoLC)1038684090 |z (OCoLC)1042317894 |z (OCoLC)1047576674 |z (OCoLC)1049142120 |z (OCoLC)1055255708 |z (OCoLC)1055403749 |z (OCoLC)1064045376 |z (OCoLC)1076314245 |z (OCoLC)1081225326 |z (OCoLC)1096480301 |z (OCoLC)1118144670 |z (OCoLC)1121005874 |z (OCoLC)1135961058 |z (OCoLC)1153518688 |z (OCoLC)1159183753 |z (OCoLC)1228582350 | ||
037 | |a 978-1-58603-731-4 |b IOS Press |n http://www.iospress.nl | ||
042 | |a dlr | ||
050 | 4 | |a QA76.76.R44 |b S668 2007eb | |
072 | 7 | |a QA |2 lcco | |
072 | 7 | |a COM |x COM014000 |2 bisacsh | |
082 | 7 | |a 005 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Software system reliability and security / |c edited by Manfred Broy, Johannes Grünbauer and Tony Hoare. |
260 | |a Amsterdam ; |a Washington, DC : |b IOS Press, |c ©2007. | ||
300 | |a 1 online resource (ix, 417 pages :) | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
347 | |a data file | ||
490 | 1 | |a NATO security through science series. Sub-series D, Information and communication security, |x 1574-5589 ; |v v. 9 | |
504 | |a Includes bibliographical references. | ||
505 | 0 | |a Cover -- Preface -- Contents -- Logics and Automata for Software Model-Checking -- Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures -- Using Invariants to Reason About Cryptographic Protocols -- Verified Interoperable Implementations of Security Protocols -- Compensable Transactions -- Automata on Infinite Words and Their Applications in Formal Verification -- Practical Principles for Computer Security -- Engineering Requirements for System Reliability and Security -- Pervasive Verification of Distributed Real-Time Systems -- Verification and Synthesis of Reactive Programs -- Security, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles -- A Verifying Compiler for a Multi-Threaded Object-Oriented Language -- Author Index -- Last Page. | |
588 | 0 | |a Print version record. | |
520 | |a To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering. | ||
506 | |3 Use copy |f Restrictions unspecified |2 star |5 MiAaHDL | ||
533 | |a Electronic reproduction. |b [Place of publication not identified] : |c HathiTrust Digital Library, |d 2010. |5 MiAaHDL | ||
538 | |a Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. |u http://purl.oclc.org/DLF/benchrepro0212 |5 MiAaHDL | ||
583 | 1 | |a digitized |c 2010 |h HathiTrust Digital Library |l committed to preserve |2 pda |5 MiAaHDL | |
650 | 0 | |a Computer software |x Reliability |v Congresses. | |
650 | 0 | |a Computer security |v Congresses. | |
650 | 6 | |a Logiciels |x Fiabilité |v Congrès. | |
650 | 6 | |a Sécurité informatique |v Congrès. | |
650 | 7 | |a REFERENCE |x General. |2 bisacsh | |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Computer software |x Reliability |2 fast | |
655 | 7 | |a Conference papers and proceedings |2 fast | |
700 | 1 | |a Broy, M., |d 1949- |1 https://id.oclc.org/worldcat/entity/E39PBJw8T4PrdpfW4QPGjfQXh3 |0 http://id.loc.gov/authorities/names/n79060851 | |
700 | 1 | |a Grünbauer, Johannes. |0 http://id.loc.gov/authorities/names/no2007106314 | |
700 | 1 | |a Hoare, C. A. R. |q (Charles Antony Richard), |d 1934- |1 https://id.oclc.org/worldcat/entity/E39PBJd8dcpHCjCXDjKtFghmBP |0 http://id.loc.gov/authorities/names/n84148204 | |
758 | |i has work: |a Software system reliability and security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCFFgJDky8FFMdBKVDJdMCP |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Software system reliability and security. |d Amsterdam ; Washington, DC : IOS Press, ©2007 |w (DLC) 2007922976 |
830 | 0 | |a NATO security through science series. |n D, |p Information and communication security ; |v v. 9. |0 http://id.loc.gov/authorities/names/no2006064032 | |
856 | 1 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981 |3 Volltext | |
856 | 1 | |l CBO01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981 |3 Volltext | |
936 | |a BATCHLOAD | ||
938 | |a EBL - Ebook Library |b EBLB |n EBL305176 | ||
938 | |a EBSCOhost |b EBSC |n 201981 | ||
938 | |a YBP Library Services |b YANK |n 2704211 | ||
938 | |a YBP Library Services |b YANK |n 2625547 | ||
938 | |a YBP Library Services |b YANK |n 3207249 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-ocn290589228 |
---|---|
_version_ | 1813903331307814912 |
adam_text | |
any_adam_object | |
author2 | Broy, M., 1949- Grünbauer, Johannes Hoare, C. A. R. (Charles Antony Richard), 1934- |
author2_role | |
author2_variant | m b mb j g jg c a r h car carh |
author_GND | http://id.loc.gov/authorities/names/n79060851 http://id.loc.gov/authorities/names/no2007106314 http://id.loc.gov/authorities/names/n84148204 |
author_facet | Broy, M., 1949- Grünbauer, Johannes Hoare, C. A. R. (Charles Antony Richard), 1934- |
author_sort | Broy, M., 1949- |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.76.R44 S668 2007eb |
callnumber-search | QA76.76.R44 S668 2007eb |
callnumber-sort | QA 276.76 R44 S668 42007EB |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Cover -- Preface -- Contents -- Logics and Automata for Software Model-Checking -- Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures -- Using Invariants to Reason About Cryptographic Protocols -- Verified Interoperable Implementations of Security Protocols -- Compensable Transactions -- Automata on Infinite Words and Their Applications in Formal Verification -- Practical Principles for Computer Security -- Engineering Requirements for System Reliability and Security -- Pervasive Verification of Distributed Real-Time Systems -- Verification and Synthesis of Reactive Programs -- Security, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles -- A Verifying Compiler for a Multi-Threaded Object-Oriented Language -- Author Index -- Last Page. |
ctrlnum | (OCoLC)290589228 |
dewey-full | 005 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005 |
dewey-search | 005 |
dewey-sort | 15 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>06360cam a2200769 a 4500</leader><controlfield tag="001">ZDB-4-EBA-ocn290589228</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20240705115654.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">070511s2007 ne a ob 100 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaPaEBR</subfield><subfield code="b">eng</subfield><subfield code="e">pn</subfield><subfield code="c">COCUF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">N$T</subfield><subfield code="d">YDXCP</subfield><subfield code="d">IOSPR</subfield><subfield code="d">OCLCE</subfield><subfield code="d">IDEBK</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">LYU</subfield><subfield code="d">E7B</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">FVL</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">MERUC</subfield><subfield code="d">EBLCP</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">DEBSZ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCL</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">AZK</subfield><subfield code="d">AGLDB</subfield><subfield code="d">MOR</subfield><subfield code="d">PIFBR</subfield><subfield code="d">ZCU</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">U3W</subfield><subfield code="d">OCLCA</subfield><subfield code="d">BRL</subfield><subfield code="d">STF</subfield><subfield code="d">WRM</subfield><subfield code="d">JBG</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">VTS</subfield><subfield code="d">EZ9</subfield><subfield code="d">ICG</subfield><subfield code="d">INT</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">WYU</subfield><subfield code="d">A6Q</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">DKC</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">CEF</subfield><subfield code="d">M8D</subfield><subfield code="d">NLW</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UKCRE</subfield><subfield code="d">AJS</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">170931716</subfield><subfield code="a">171562451</subfield><subfield code="a">491261860</subfield><subfield code="a">608476772</subfield><subfield code="a">632697490</subfield><subfield code="a">648307892</subfield><subfield code="a">658630561</subfield><subfield code="a">722592988</subfield><subfield code="a">728029223</subfield><subfield code="a">744987067</subfield><subfield code="a">814502460</subfield><subfield code="a">961525785</subfield><subfield code="a">962592654</subfield><subfield code="a">974199651</subfield><subfield code="a">974456569</subfield><subfield code="a">980278061</subfield><subfield code="a">981361481</subfield><subfield code="a">988503593</subfield><subfield code="a">991584556</subfield><subfield code="a">992068421</subfield><subfield code="a">1005640423</subfield><subfield code="a">1018084014</subfield><subfield code="a">1037505915</subfield><subfield code="a">1038684090</subfield><subfield code="a">1042317894</subfield><subfield code="a">1047576674</subfield><subfield code="a">1049142120</subfield><subfield code="a">1055255708</subfield><subfield code="a">1055403749</subfield><subfield code="a">1064045376</subfield><subfield code="a">1076314245</subfield><subfield code="a">1081225326</subfield><subfield code="a">1096480301</subfield><subfield code="a">1118144670</subfield><subfield code="a">1121005874</subfield><subfield code="a">1135961058</subfield><subfield code="a">1153518688</subfield><subfield code="a">1159183753</subfield><subfield code="a">1228582350</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781429492232</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1429492236</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1433708744</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781433708749</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781607502364</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1607502364</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781586037314</subfield><subfield code="q">(hd. bd.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1586037315</subfield><subfield code="q">(hd. bd.)</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)290589228</subfield><subfield code="z">(OCoLC)170931716</subfield><subfield code="z">(OCoLC)171562451</subfield><subfield code="z">(OCoLC)491261860</subfield><subfield code="z">(OCoLC)608476772</subfield><subfield code="z">(OCoLC)632697490</subfield><subfield code="z">(OCoLC)648307892</subfield><subfield code="z">(OCoLC)658630561</subfield><subfield code="z">(OCoLC)722592988</subfield><subfield code="z">(OCoLC)728029223</subfield><subfield code="z">(OCoLC)744987067</subfield><subfield code="z">(OCoLC)814502460</subfield><subfield code="z">(OCoLC)961525785</subfield><subfield code="z">(OCoLC)962592654</subfield><subfield code="z">(OCoLC)974199651</subfield><subfield code="z">(OCoLC)974456569</subfield><subfield code="z">(OCoLC)980278061</subfield><subfield code="z">(OCoLC)981361481</subfield><subfield code="z">(OCoLC)988503593</subfield><subfield code="z">(OCoLC)991584556</subfield><subfield code="z">(OCoLC)992068421</subfield><subfield code="z">(OCoLC)1005640423</subfield><subfield code="z">(OCoLC)1018084014</subfield><subfield code="z">(OCoLC)1037505915</subfield><subfield code="z">(OCoLC)1038684090</subfield><subfield code="z">(OCoLC)1042317894</subfield><subfield code="z">(OCoLC)1047576674</subfield><subfield code="z">(OCoLC)1049142120</subfield><subfield code="z">(OCoLC)1055255708</subfield><subfield code="z">(OCoLC)1055403749</subfield><subfield code="z">(OCoLC)1064045376</subfield><subfield code="z">(OCoLC)1076314245</subfield><subfield code="z">(OCoLC)1081225326</subfield><subfield code="z">(OCoLC)1096480301</subfield><subfield code="z">(OCoLC)1118144670</subfield><subfield code="z">(OCoLC)1121005874</subfield><subfield code="z">(OCoLC)1135961058</subfield><subfield code="z">(OCoLC)1153518688</subfield><subfield code="z">(OCoLC)1159183753</subfield><subfield code="z">(OCoLC)1228582350</subfield></datafield><datafield tag="037" ind1=" " ind2=" "><subfield code="a">978-1-58603-731-4</subfield><subfield code="b">IOS Press</subfield><subfield code="n">http://www.iospress.nl</subfield></datafield><datafield tag="042" ind1=" " ind2=" "><subfield code="a">dlr</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.76.R44</subfield><subfield code="b">S668 2007eb</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">QA</subfield><subfield code="2">lcco</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">COM014000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Software system reliability and security /</subfield><subfield code="c">edited by Manfred Broy, Johannes Grünbauer and Tony Hoare.</subfield></datafield><datafield tag="260" ind1=" " ind2=" "><subfield code="a">Amsterdam ;</subfield><subfield code="a">Washington, DC :</subfield><subfield code="b">IOS Press,</subfield><subfield code="c">©2007.</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (ix, 417 pages :)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="347" ind1=" " ind2=" "><subfield code="a">data file</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">NATO security through science series. Sub-series D, Information and communication security,</subfield><subfield code="x">1574-5589 ;</subfield><subfield code="v">v. 9</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Cover -- Preface -- Contents -- Logics and Automata for Software Model-Checking -- Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures -- Using Invariants to Reason About Cryptographic Protocols -- Verified Interoperable Implementations of Security Protocols -- Compensable Transactions -- Automata on Infinite Words and Their Applications in Formal Verification -- Practical Principles for Computer Security -- Engineering Requirements for System Reliability and Security -- Pervasive Verification of Distributed Real-Time Systems -- Verification and Synthesis of Reactive Programs -- Security, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles -- A Verifying Compiler for a Multi-Threaded Object-Oriented Language -- Author Index -- Last Page.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="3">Use copy</subfield><subfield code="f">Restrictions unspecified</subfield><subfield code="2">star</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="533" ind1=" " ind2=" "><subfield code="a">Electronic reproduction.</subfield><subfield code="b">[Place of publication not identified] :</subfield><subfield code="c">HathiTrust Digital Library,</subfield><subfield code="d">2010.</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002.</subfield><subfield code="u">http://purl.oclc.org/DLF/benchrepro0212</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="583" ind1="1" ind2=" "><subfield code="a">digitized</subfield><subfield code="c">2010</subfield><subfield code="h">HathiTrust Digital Library</subfield><subfield code="l">committed to preserve</subfield><subfield code="2">pda</subfield><subfield code="5">MiAaHDL</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer software</subfield><subfield code="x">Reliability</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security</subfield><subfield code="v">Congresses.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Logiciels</subfield><subfield code="x">Fiabilité</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique</subfield><subfield code="v">Congrès.</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">REFERENCE</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer software</subfield><subfield code="x">Reliability</subfield><subfield code="2">fast</subfield></datafield><datafield tag="655" ind1=" " ind2="7"><subfield code="a">Conference papers and proceedings</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Broy, M.,</subfield><subfield code="d">1949-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJw8T4PrdpfW4QPGjfQXh3</subfield><subfield code="0">http://id.loc.gov/authorities/names/n79060851</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Grünbauer, Johannes.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2007106314</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Hoare, C. A. R.</subfield><subfield code="q">(Charles Antony Richard),</subfield><subfield code="d">1934-</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PBJd8dcpHCjCXDjKtFghmBP</subfield><subfield code="0">http://id.loc.gov/authorities/names/n84148204</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Software system reliability and security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCFFgJDky8FFMdBKVDJdMCP</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Software system reliability and security.</subfield><subfield code="d">Amsterdam ; Washington, DC : IOS Press, ©2007</subfield><subfield code="w">(DLC) 2007922976</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">NATO security through science series.</subfield><subfield code="n">D,</subfield><subfield code="p">Information and communication security ;</subfield><subfield code="v">v. 9.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2006064032</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="856" ind1="1" ind2=" "><subfield code="l">CBO01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="936" ind1=" " ind2=" "><subfield code="a">BATCHLOAD</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBL - Ebook Library</subfield><subfield code="b">EBLB</subfield><subfield code="n">EBL305176</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">201981</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2704211</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">2625547</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">3207249</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield></record></collection> |
genre | Conference papers and proceedings fast |
genre_facet | Conference papers and proceedings |
id | ZDB-4-EBA-ocn290589228 |
illustrated | Illustrated |
indexdate | 2024-10-25T16:16:59Z |
institution | BVB |
isbn | 9781429492232 1429492236 1433708744 9781433708749 9781607502364 1607502364 |
issn | 1574-5589 ; |
language | English |
oclc_num | 290589228 |
open_access_boolean | |
owner | MAIN |
owner_facet | MAIN |
physical | 1 online resource (ix, 417 pages :) |
psigel | ZDB-4-EBA |
publishDate | 2007 |
publishDateSearch | 2007 |
publishDateSort | 2007 |
publisher | IOS Press, |
record_format | marc |
series | NATO security through science series. Information and communication security ; |
series2 | NATO security through science series. Sub-series D, Information and communication security, |
spelling | Software system reliability and security / edited by Manfred Broy, Johannes Grünbauer and Tony Hoare. Amsterdam ; Washington, DC : IOS Press, ©2007. 1 online resource (ix, 417 pages :) text txt rdacontent computer c rdamedia online resource cr rdacarrier data file NATO security through science series. Sub-series D, Information and communication security, 1574-5589 ; v. 9 Includes bibliographical references. Cover -- Preface -- Contents -- Logics and Automata for Software Model-Checking -- Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures -- Using Invariants to Reason About Cryptographic Protocols -- Verified Interoperable Implementations of Security Protocols -- Compensable Transactions -- Automata on Infinite Words and Their Applications in Formal Verification -- Practical Principles for Computer Security -- Engineering Requirements for System Reliability and Security -- Pervasive Verification of Distributed Real-Time Systems -- Verification and Synthesis of Reactive Programs -- Security, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles -- A Verifying Compiler for a Multi-Threaded Object-Oriented Language -- Author Index -- Last Page. Print version record. To make communication and computation secure against catastrophic failure and malicious interference, it is essential to build secure software systems and methods for their development. This book describes the ideas on how to meet these challenges in software engineering. Use copy Restrictions unspecified star MiAaHDL Electronic reproduction. [Place of publication not identified] : HathiTrust Digital Library, 2010. MiAaHDL Master and use copy. Digital master created according to Benchmark for Faithful Digital Reproductions of Monographs and Serials, Version 1. Digital Library Federation, December 2002. http://purl.oclc.org/DLF/benchrepro0212 MiAaHDL digitized 2010 HathiTrust Digital Library committed to preserve pda MiAaHDL Computer software Reliability Congresses. Computer security Congresses. Logiciels Fiabilité Congrès. Sécurité informatique Congrès. REFERENCE General. bisacsh Computer security fast Computer software Reliability fast Conference papers and proceedings fast Broy, M., 1949- https://id.oclc.org/worldcat/entity/E39PBJw8T4PrdpfW4QPGjfQXh3 http://id.loc.gov/authorities/names/n79060851 Grünbauer, Johannes. http://id.loc.gov/authorities/names/no2007106314 Hoare, C. A. R. (Charles Antony Richard), 1934- https://id.oclc.org/worldcat/entity/E39PBJd8dcpHCjCXDjKtFghmBP http://id.loc.gov/authorities/names/n84148204 has work: Software system reliability and security (Text) https://id.oclc.org/worldcat/entity/E39PCFFgJDky8FFMdBKVDJdMCP https://id.oclc.org/worldcat/ontology/hasWork Print version: Software system reliability and security. Amsterdam ; Washington, DC : IOS Press, ©2007 (DLC) 2007922976 NATO security through science series. D, Information and communication security ; v. 9. http://id.loc.gov/authorities/names/no2006064032 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981 Volltext CBO01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981 Volltext |
spellingShingle | Software system reliability and security / NATO security through science series. Information and communication security ; Cover -- Preface -- Contents -- Logics and Automata for Software Model-Checking -- Specifying, Relating and Composing Object Oriented Interfaces, Components and Architectures -- Using Invariants to Reason About Cryptographic Protocols -- Verified Interoperable Implementations of Security Protocols -- Compensable Transactions -- Automata on Infinite Words and Their Applications in Formal Verification -- Practical Principles for Computer Security -- Engineering Requirements for System Reliability and Security -- Pervasive Verification of Distributed Real-Time Systems -- Verification and Synthesis of Reactive Programs -- Security, Privacy, Usability and Reliability (SPUR) in Mobile Networked Embedded Systems: The Case of Modern Automobiles -- A Verifying Compiler for a Multi-Threaded Object-Oriented Language -- Author Index -- Last Page. Computer software Reliability Congresses. Computer security Congresses. Logiciels Fiabilité Congrès. Sécurité informatique Congrès. REFERENCE General. bisacsh Computer security fast Computer software Reliability fast |
title | Software system reliability and security / |
title_auth | Software system reliability and security / |
title_exact_search | Software system reliability and security / |
title_full | Software system reliability and security / edited by Manfred Broy, Johannes Grünbauer and Tony Hoare. |
title_fullStr | Software system reliability and security / edited by Manfred Broy, Johannes Grünbauer and Tony Hoare. |
title_full_unstemmed | Software system reliability and security / edited by Manfred Broy, Johannes Grünbauer and Tony Hoare. |
title_short | Software system reliability and security / |
title_sort | software system reliability and security |
topic | Computer software Reliability Congresses. Computer security Congresses. Logiciels Fiabilité Congrès. Sécurité informatique Congrès. REFERENCE General. bisacsh Computer security fast Computer software Reliability fast |
topic_facet | Computer software Reliability Congresses. Computer security Congresses. Logiciels Fiabilité Congrès. Sécurité informatique Congrès. REFERENCE General. Computer security Computer software Reliability Conference papers and proceedings |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=201981 |
work_keys_str_mv | AT broym softwaresystemreliabilityandsecurity AT grunbauerjohannes softwaresystemreliabilityandsecurity AT hoarecar softwaresystemreliabilityandsecurity |