Empirical research for software security :: foundations and experience /
"Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that...
Gespeichert in:
Weitere Verfasser: | , , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Boca Raton, FL :
CRC Press,
[2018]
|
Ausgabe: | First edition. |
Schriftenreihe: | Series in security, privacy, and trust.
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher |
Beschreibung: | 1 online resource (xxviii, 340 pages) : 43 black and white images, 57 tables, 29 halftones and 14 line drawings |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781315154855 1315154854 9781498776424 1498776426 |
Internformat
MARC
LEADER | 00000cam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-4-EBA-on1003994047 | ||
003 | OCoLC | ||
005 | 20241004212047.0 | ||
006 | m o d | ||
007 | cr cn||||||||| | ||
008 | 171114s2018 flu ob 001 0 eng d | ||
040 | |a CRCPR |b eng |e rda |e pn |c CRCPR |d IDEBK |d N$T |d STF |d N$T |d YDX |d OCLCA |d OCLCF |d MCW |d CAUOI |d OCLCQ |d OCLCO |d ERL |d OCLCA |d MERER |d CEF |d OCLCQ |d UPM |d U3W |d BNG |d TYFRS |d LOA |d OCLCQ |d K6U |d VT2 |d OCLCQ |d OCLCO |d OCLCQ |d ELBRO |d OCLCO |d OCLCQ |d SFB |d OCLCQ |d OCLCO |d OCLCL | ||
019 | |a 993948992 |a 1031041166 |a 1079402392 |a 1135389353 |a 1192329700 |a 1193985831 |a 1228540254 | ||
020 | |a 9781315154855 |q (electronic bk.) | ||
020 | |a 1315154854 |q (electronic bk.) | ||
020 | |a 9781498776424 |q (electronic bk.) | ||
020 | |a 1498776426 |q (electronic bk.) | ||
020 | |z 9781498776417 | ||
020 | |z 1498776418 | ||
035 | |a (OCoLC)1003994047 |z (OCoLC)993948992 |z (OCoLC)1031041166 |z (OCoLC)1079402392 |z (OCoLC)1135389353 |z (OCoLC)1192329700 |z (OCoLC)1193985831 |z (OCoLC)1228540254 | ||
050 | 4 | |a QA76.9.A25 | |
072 | 7 | |a COM |x 059000 |2 bisacsh | |
072 | 7 | |a COM |x 053000 |2 bisacsh | |
082 | 7 | |a 005.8 |2 22 | |
049 | |a MAIN | ||
245 | 0 | 0 | |a Empirical research for software security : |b foundations and experience / |c edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. |
250 | |a First edition. | ||
264 | 1 | |a Boca Raton, FL : |b CRC Press, |c [2018] | |
300 | |a 1 online resource (xxviii, 340 pages) : |b 43 black and white images, 57 tables, 29 halftones and 14 line drawings | ||
336 | |a text |b txt |2 rdacontent | ||
337 | |a computer |b c |2 rdamedia | ||
338 | |a online resource |b cr |2 rdacarrier | ||
490 | 1 | |a CRC series in security, privacy and trust | |
520 | 2 | |a "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher | |
504 | |a Includes bibliographical references and index. | ||
505 | 0 | 0 | |t Empirical research on security and privacy by design / |r Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen -- |t Guidelines for systematic mapping studies in security engineering / |r Michael Felderer and Jeffrey C. Carver -- |t Introduction to data analytics for software security / |r Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski -- |t Generating software security knowledge through empirical methods / |r René Noël, Santiago Matalonga, Gilberto Pedraza, Hernán Astudillo, and Eduardo B. Fernandez -- |t Visual analytics : foundations and experiences in malware analysis / |r Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Rischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner -- |t Analysis of metrics for classification accuracy in intrusion detection / |r Natalia Stakhanova and Alvaro A. Cardenas -- |t Building security in maturity model as a research tool / |r Martin Gilje Jaatun -- |t Agile test automation for web applications : a security perspective / |r Sandra Domenique Ringmann and Hanno Langweg -- |t Benchmark for empirical evaluation of web application anomaly detectors / |r Robert Bronte, Hossain Shahriar, and Hisham Haddad -- |t Threats to validity in empirical software security research / |r Daniela S. Cruzes and Lotfi ben Othmane. |
588 | 0 | |a Print version record. | |
650 | 0 | |a Computer security. | |
650 | 0 | |a Data protection. |0 http://id.loc.gov/authorities/subjects/sh85035859 | |
650 | 2 | |a Computer Security |0 https://id.nlm.nih.gov/mesh/D016494 | |
650 | 6 | |a Sécurité informatique. | |
650 | 6 | |a Protection de l'information (Informatique) | |
650 | 0 | 7 | |a COMPUTERS |x Security |x General. |2 bisacsh |
650 | 0 | 7 | |a COMPUTERS |x Computer Engineering. |2 bisacsh |
650 | 7 | |a Computer security |2 fast | |
650 | 7 | |a Data protection |2 fast | |
700 | 1 | |a Othmane, Lotfi ben. | |
700 | 1 | |a Jaatun, Martin Gilje. |0 http://id.loc.gov/authorities/names/nb2009031752 | |
700 | 1 | |a Weippl, Edgar R. |0 http://id.loc.gov/authorities/names/n2005030907 | |
758 | |i has work: |a Empirical research for software security (Text) |1 https://id.oclc.org/worldcat/entity/E39PCGX464dtk6BYQGp89mQgDm |4 https://id.oclc.org/worldcat/ontology/hasWork | ||
776 | 0 | 8 | |i Print version: |t Empirical research for software security |z 9781498776417 |w (OCoLC)979567120 |
830 | 0 | |a Series in security, privacy, and trust. |0 http://id.loc.gov/authorities/names/no2016171556 | |
856 | 4 | 0 | |l FWS01 |p ZDB-4-EBA |q FWS_PDA_EBA |u https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742 |3 Volltext |
938 | |a eLibro |b ELBO |n ELB141976 | ||
938 | |a EBSCOhost |b EBSC |n 1640742 | ||
938 | |a ProQuest MyiLibrary Digital eBook Collection |b IDEB |n cis37252451 | ||
938 | |a Taylor & Francis |b TAFR |n 9781315154855 | ||
938 | |a YBP Library Services |b YANK |n 15021395 | ||
938 | |a YBP Library Services |b YANK |n 15037920 | ||
938 | |a YBP Library Services |b YANK |n 15032550 | ||
994 | |a 92 |b GEBAY | ||
912 | |a ZDB-4-EBA | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-4-EBA-on1003994047 |
---|---|
_version_ | 1816882400307707904 |
adam_text | |
any_adam_object | |
author2 | Othmane, Lotfi ben Jaatun, Martin Gilje Weippl, Edgar R. |
author2_role | |
author2_variant | l b o lb lbo m g j mg mgj e r w er erw |
author_GND | http://id.loc.gov/authorities/names/nb2009031752 http://id.loc.gov/authorities/names/n2005030907 |
author_additional | Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen -- Michael Felderer and Jeffrey C. Carver -- Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski -- René Noël, Santiago Matalonga, Gilberto Pedraza, Hernán Astudillo, and Eduardo B. Fernandez -- Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Rischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner -- Natalia Stakhanova and Alvaro A. Cardenas -- Martin Gilje Jaatun -- Sandra Domenique Ringmann and Hanno Langweg -- Robert Bronte, Hossain Shahriar, and Hisham Haddad -- Daniela S. Cruzes and Lotfi ben Othmane. |
author_facet | Othmane, Lotfi ben Jaatun, Martin Gilje Weippl, Edgar R. |
author_sort | Othmane, Lotfi ben |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-4-EBA |
contents | Empirical research on security and privacy by design / Guidelines for systematic mapping studies in security engineering / Introduction to data analytics for software security / Generating software security knowledge through empirical methods / Visual analytics : foundations and experiences in malware analysis / Analysis of metrics for classification accuracy in intrusion detection / Building security in maturity model as a research tool / Agile test automation for web applications : a security perspective / Benchmark for empirical evaluation of web application anomaly detectors / Threats to validity in empirical software security research / |
ctrlnum | (OCoLC)1003994047 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
edition | First edition. |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>05400cam a2200697 i 4500</leader><controlfield tag="001">ZDB-4-EBA-on1003994047</controlfield><controlfield tag="003">OCoLC</controlfield><controlfield tag="005">20241004212047.0</controlfield><controlfield tag="006">m o d </controlfield><controlfield tag="007">cr cn|||||||||</controlfield><controlfield tag="008">171114s2018 flu ob 001 0 eng d</controlfield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CRCPR</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="e">pn</subfield><subfield code="c">CRCPR</subfield><subfield code="d">IDEBK</subfield><subfield code="d">N$T</subfield><subfield code="d">STF</subfield><subfield code="d">N$T</subfield><subfield code="d">YDX</subfield><subfield code="d">OCLCA</subfield><subfield code="d">OCLCF</subfield><subfield code="d">MCW</subfield><subfield code="d">CAUOI</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">ERL</subfield><subfield code="d">OCLCA</subfield><subfield code="d">MERER</subfield><subfield code="d">CEF</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">UPM</subfield><subfield code="d">U3W</subfield><subfield code="d">BNG</subfield><subfield code="d">TYFRS</subfield><subfield code="d">LOA</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">K6U</subfield><subfield code="d">VT2</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">ELBRO</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">SFB</subfield><subfield code="d">OCLCQ</subfield><subfield code="d">OCLCO</subfield><subfield code="d">OCLCL</subfield></datafield><datafield tag="019" ind1=" " ind2=" "><subfield code="a">993948992</subfield><subfield code="a">1031041166</subfield><subfield code="a">1079402392</subfield><subfield code="a">1135389353</subfield><subfield code="a">1192329700</subfield><subfield code="a">1193985831</subfield><subfield code="a">1228540254</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781315154855</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1315154854</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781498776424</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">1498776426</subfield><subfield code="q">(electronic bk.)</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781498776417</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">1498776418</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1003994047</subfield><subfield code="z">(OCoLC)993948992</subfield><subfield code="z">(OCoLC)1031041166</subfield><subfield code="z">(OCoLC)1079402392</subfield><subfield code="z">(OCoLC)1135389353</subfield><subfield code="z">(OCoLC)1192329700</subfield><subfield code="z">(OCoLC)1193985831</subfield><subfield code="z">(OCoLC)1228540254</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">059000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="072" ind1=" " ind2="7"><subfield code="a">COM</subfield><subfield code="x">053000</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">22</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">MAIN</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Empirical research for software security :</subfield><subfield code="b">foundations and experience /</subfield><subfield code="c">edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl.</subfield></datafield><datafield tag="250" ind1=" " ind2=" "><subfield code="a">First edition.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Boca Raton, FL :</subfield><subfield code="b">CRC Press,</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 online resource (xxviii, 340 pages) :</subfield><subfield code="b">43 black and white images, 57 tables, 29 halftones and 14 line drawings</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">computer</subfield><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="490" ind1="1" ind2=" "><subfield code="a">CRC series in security, privacy and trust</subfield></datafield><datafield tag="520" ind1="2" ind2=" "><subfield code="a">"Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2="0"><subfield code="t">Empirical research on security and privacy by design /</subfield><subfield code="r">Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen --</subfield><subfield code="t">Guidelines for systematic mapping studies in security engineering /</subfield><subfield code="r">Michael Felderer and Jeffrey C. Carver --</subfield><subfield code="t">Introduction to data analytics for software security /</subfield><subfield code="r">Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski --</subfield><subfield code="t">Generating software security knowledge through empirical methods /</subfield><subfield code="r">René Noël, Santiago Matalonga, Gilberto Pedraza, Hernán Astudillo, and Eduardo B. Fernandez --</subfield><subfield code="t">Visual analytics : foundations and experiences in malware analysis /</subfield><subfield code="r">Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Rischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner --</subfield><subfield code="t">Analysis of metrics for classification accuracy in intrusion detection /</subfield><subfield code="r">Natalia Stakhanova and Alvaro A. Cardenas --</subfield><subfield code="t">Building security in maturity model as a research tool /</subfield><subfield code="r">Martin Gilje Jaatun --</subfield><subfield code="t">Agile test automation for web applications : a security perspective /</subfield><subfield code="r">Sandra Domenique Ringmann and Hanno Langweg --</subfield><subfield code="t">Benchmark for empirical evaluation of web application anomaly detectors /</subfield><subfield code="r">Robert Bronte, Hossain Shahriar, and Hisham Haddad --</subfield><subfield code="t">Threats to validity in empirical software security research /</subfield><subfield code="r">Daniela S. Cruzes and Lotfi ben Othmane.</subfield></datafield><datafield tag="588" ind1="0" ind2=" "><subfield code="a">Print version record.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Data protection.</subfield><subfield code="0">http://id.loc.gov/authorities/subjects/sh85035859</subfield></datafield><datafield tag="650" ind1=" " ind2="2"><subfield code="a">Computer Security</subfield><subfield code="0">https://id.nlm.nih.gov/mesh/D016494</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Sécurité informatique.</subfield></datafield><datafield tag="650" ind1=" " ind2="6"><subfield code="a">Protection de l'information (Informatique)</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Security</subfield><subfield code="x">General.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1="0" ind2="7"><subfield code="a">COMPUTERS</subfield><subfield code="x">Computer Engineering.</subfield><subfield code="2">bisacsh</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Computer security</subfield><subfield code="2">fast</subfield></datafield><datafield tag="650" ind1=" " ind2="7"><subfield code="a">Data protection</subfield><subfield code="2">fast</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Othmane, Lotfi ben.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Jaatun, Martin Gilje.</subfield><subfield code="0">http://id.loc.gov/authorities/names/nb2009031752</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Weippl, Edgar R.</subfield><subfield code="0">http://id.loc.gov/authorities/names/n2005030907</subfield></datafield><datafield tag="758" ind1=" " ind2=" "><subfield code="i">has work:</subfield><subfield code="a">Empirical research for software security (Text)</subfield><subfield code="1">https://id.oclc.org/worldcat/entity/E39PCGX464dtk6BYQGp89mQgDm</subfield><subfield code="4">https://id.oclc.org/worldcat/ontology/hasWork</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="t">Empirical research for software security</subfield><subfield code="z">9781498776417</subfield><subfield code="w">(OCoLC)979567120</subfield></datafield><datafield tag="830" ind1=" " ind2="0"><subfield code="a">Series in security, privacy, and trust.</subfield><subfield code="0">http://id.loc.gov/authorities/names/no2016171556</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-4-EBA</subfield><subfield code="q">FWS_PDA_EBA</subfield><subfield code="u">https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">eLibro</subfield><subfield code="b">ELBO</subfield><subfield code="n">ELB141976</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">EBSCOhost</subfield><subfield code="b">EBSC</subfield><subfield code="n">1640742</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">ProQuest MyiLibrary Digital eBook Collection</subfield><subfield code="b">IDEB</subfield><subfield code="n">cis37252451</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">Taylor & Francis</subfield><subfield code="b">TAFR</subfield><subfield code="n">9781315154855</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15021395</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15037920</subfield></datafield><datafield tag="938" ind1=" " ind2=" "><subfield code="a">YBP Library Services</subfield><subfield code="b">YANK</subfield><subfield code="n">15032550</subfield></datafield><datafield tag="994" ind1=" " ind2=" "><subfield code="a">92</subfield><subfield code="b">GEBAY</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-4-EBA</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-4-EBA-on1003994047 |
illustrated | Not Illustrated |
indexdate | 2024-11-27T13:28:01Z |
institution | BVB |
isbn | 9781315154855 1315154854 9781498776424 1498776426 |
language | English |
oclc_num | 1003994047 |
open_access_boolean | |
owner | MAIN DE-863 DE-BY-FWS |
owner_facet | MAIN DE-863 DE-BY-FWS |
physical | 1 online resource (xxviii, 340 pages) : 43 black and white images, 57 tables, 29 halftones and 14 line drawings |
psigel | ZDB-4-EBA |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | CRC Press, |
record_format | marc |
series | Series in security, privacy, and trust. |
series2 | CRC series in security, privacy and trust |
spelling | Empirical research for software security : foundations and experience / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. First edition. Boca Raton, FL : CRC Press, [2018] 1 online resource (xxviii, 340 pages) : 43 black and white images, 57 tables, 29 halftones and 14 line drawings text txt rdacontent computer c rdamedia online resource cr rdacarrier CRC series in security, privacy and trust "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher Includes bibliographical references and index. Empirical research on security and privacy by design / Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen -- Guidelines for systematic mapping studies in security engineering / Michael Felderer and Jeffrey C. Carver -- Introduction to data analytics for software security / Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski -- Generating software security knowledge through empirical methods / René Noël, Santiago Matalonga, Gilberto Pedraza, Hernán Astudillo, and Eduardo B. Fernandez -- Visual analytics : foundations and experiences in malware analysis / Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Rischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner -- Analysis of metrics for classification accuracy in intrusion detection / Natalia Stakhanova and Alvaro A. Cardenas -- Building security in maturity model as a research tool / Martin Gilje Jaatun -- Agile test automation for web applications : a security perspective / Sandra Domenique Ringmann and Hanno Langweg -- Benchmark for empirical evaluation of web application anomaly detectors / Robert Bronte, Hossain Shahriar, and Hisham Haddad -- Threats to validity in empirical software security research / Daniela S. Cruzes and Lotfi ben Othmane. Print version record. Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Security General. bisacsh COMPUTERS Computer Engineering. bisacsh Computer security fast Data protection fast Othmane, Lotfi ben. Jaatun, Martin Gilje. http://id.loc.gov/authorities/names/nb2009031752 Weippl, Edgar R. http://id.loc.gov/authorities/names/n2005030907 has work: Empirical research for software security (Text) https://id.oclc.org/worldcat/entity/E39PCGX464dtk6BYQGp89mQgDm https://id.oclc.org/worldcat/ontology/hasWork Print version: Empirical research for software security 9781498776417 (OCoLC)979567120 Series in security, privacy, and trust. http://id.loc.gov/authorities/names/no2016171556 FWS01 ZDB-4-EBA FWS_PDA_EBA https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742 Volltext |
spellingShingle | Empirical research for software security : foundations and experience / Series in security, privacy, and trust. Empirical research on security and privacy by design / Guidelines for systematic mapping studies in security engineering / Introduction to data analytics for software security / Generating software security knowledge through empirical methods / Visual analytics : foundations and experiences in malware analysis / Analysis of metrics for classification accuracy in intrusion detection / Building security in maturity model as a research tool / Agile test automation for web applications : a security perspective / Benchmark for empirical evaluation of web application anomaly detectors / Threats to validity in empirical software security research / Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Security General. bisacsh COMPUTERS Computer Engineering. bisacsh Computer security fast Data protection fast |
subject_GND | http://id.loc.gov/authorities/subjects/sh85035859 https://id.nlm.nih.gov/mesh/D016494 |
title | Empirical research for software security : foundations and experience / |
title_alt | Empirical research on security and privacy by design / Guidelines for systematic mapping studies in security engineering / Introduction to data analytics for software security / Generating software security knowledge through empirical methods / Visual analytics : foundations and experiences in malware analysis / Analysis of metrics for classification accuracy in intrusion detection / Building security in maturity model as a research tool / Agile test automation for web applications : a security perspective / Benchmark for empirical evaluation of web application anomaly detectors / Threats to validity in empirical software security research / |
title_auth | Empirical research for software security : foundations and experience / |
title_exact_search | Empirical research for software security : foundations and experience / |
title_full | Empirical research for software security : foundations and experience / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. |
title_fullStr | Empirical research for software security : foundations and experience / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. |
title_full_unstemmed | Empirical research for software security : foundations and experience / edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. |
title_short | Empirical research for software security : |
title_sort | empirical research for software security foundations and experience |
title_sub | foundations and experience / |
topic | Computer security. Data protection. http://id.loc.gov/authorities/subjects/sh85035859 Computer Security https://id.nlm.nih.gov/mesh/D016494 Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Security General. bisacsh COMPUTERS Computer Engineering. bisacsh Computer security fast Data protection fast |
topic_facet | Computer security. Data protection. Computer Security Sécurité informatique. Protection de l'information (Informatique) COMPUTERS Security General. COMPUTERS Computer Engineering. Computer security Data protection |
url | https://search.ebscohost.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742 |
work_keys_str_mv | AT othmanelotfiben empiricalresearchforsoftwaresecurityfoundationsandexperience AT jaatunmartingilje empiricalresearchforsoftwaresecurityfoundationsandexperience AT weippledgarr empiricalresearchforsoftwaresecurityfoundationsandexperience |