Exploring security in software architecture and design:
"This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, de...
Gespeichert in:
Weitere Verfasser: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | English |
Veröffentlicht: |
Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :
IGI Global,
[c2019]
|
Schlagworte: | |
Online-Zugang: | Volltext |
Zusammenfassung: | "This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"-- |
Beschreibung: | 19 PDFs (349 pages) Also available in print. |
Format: | Mode of access: World Wide Web. |
Bibliographie: | Includes bibliographical references and index. |
ISBN: | 9781522563143 |
Zugangseinschränkungen: | Restricted to subscribers or individual electronic text purchasers. |
Internformat
MARC
LEADER | 00000nam a2200000 i 4500 | ||
---|---|---|---|
001 | ZDB-98-IGB-00199087 | ||
003 | IGIG | ||
005 | 20190123082934.0 | ||
006 | m eo d | ||
007 | cr bn |||m|||a | ||
008 | 190124s2019 pau fob 001 0 eng d | ||
010 | |z 2018008109 | ||
020 | |a 9781522563143 |q eISBN | ||
020 | |z 9781522563136 |q h/c | ||
024 | 7 | |a 10.4018/978-1-5225-6313-6 |2 doi | |
035 | |a (CaBNVSL)slc20407596 | ||
035 | |a (OCoLC)1083483565 | ||
040 | |a CaBNVSL |b eng |e rda |c CaBNVSL |d CaBNVSL | ||
050 | 4 | |a QA76.9.A25 |b E996 2018e | |
082 | 7 | |a 005.8 |2 23 | |
245 | 0 | 0 | |a Exploring security in software architecture and design |c Michael Felderer and Riccardo Scandariato, editor. |
264 | 1 | |a Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : |b IGI Global, |c [c2019] | |
300 | |a 19 PDFs (349 pages) | ||
336 | |a text |2 rdacontent | ||
337 | |a electronic |2 isbdmedia | ||
338 | |a online resource |2 rdacarrier | ||
504 | |a Includes bibliographical references and index. | ||
505 | 0 | |a Chapter 1. Threat modeling in agile software development -- Chapter 2. Quantitative security assurance -- Chapter 3. Security assurance in agile software development methods: an analysis of Scrum, XP, and Kanban -- Chapter 4. An evaluation of a test-driven security risk analysis approach based on two industrial case studies -- Chapter 5. Modeling and re-evaluating security in an incremental development of RBAC-based systems using b method -- Chapter 6. Designing secure software by testing application of security patterns -- Chapter 7. State actor model for cloud-based online auction -- Chapter 8. Blockchain for security of cloud-based online auction -- Chapter 9. Performing security on digital images -- Chapter 10. A framework for image encryption on frequency domain -- Chapter 11. Measuring developers' software security skills, usage, and training needs -- Chapter 12. Challenges in agile security engineering: a case study. | |
506 | |a Restricted to subscribers or individual electronic text purchasers. | ||
520 | 3 | |a "This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"-- |c Provided by publisher. | |
530 | |a Also available in print. | ||
538 | |a Mode of access: World Wide Web. | ||
588 | |a Description based on title screen (IGI Global, viewed 01/24/2019). | ||
650 | 0 | |a Computer security. | |
650 | 0 | |a Software architecture |x Security measures. | |
650 | 0 | |a Software engineering |x Security measures. | |
700 | 1 | |a Felderer, Michael, |e editor. | |
700 | 1 | |a Scandariato, Riccardo, |e editor. | |
710 | 2 | |a IGI Global, |e publisher. | |
776 | 0 | |c (Original) |w (DLC)2018008109 | |
776 | 0 | 8 | |i Print version: |z 152256313X |z 9781522563136 |w (DLC) 2018008109 |
856 | 4 | 0 | |l FWS01 |p ZDB-98-IGB |q FWS_PDA_IGB |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |3 Volltext |
912 | |a ZDB-98-IGB | ||
049 | |a DE-863 |
Datensatz im Suchindex
DE-BY-FWS_katkey | ZDB-98-IGB-00199087 |
---|---|
_version_ | 1816797080566366208 |
adam_text | |
any_adam_object | |
author2 | Felderer, Michael Scandariato, Riccardo |
author2_role | edt edt |
author2_variant | m f mf r s rs |
author_facet | Felderer, Michael Scandariato, Riccardo |
building | Verbundindex |
bvnumber | localFWS |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 E996 2018e |
callnumber-search | QA76.9.A25 E996 2018e |
callnumber-sort | QA 276.9 A25 E996 42018E |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB |
contents | Chapter 1. Threat modeling in agile software development -- Chapter 2. Quantitative security assurance -- Chapter 3. Security assurance in agile software development methods: an analysis of Scrum, XP, and Kanban -- Chapter 4. An evaluation of a test-driven security risk analysis approach based on two industrial case studies -- Chapter 5. Modeling and re-evaluating security in an incremental development of RBAC-based systems using b method -- Chapter 6. Designing secure software by testing application of security patterns -- Chapter 7. State actor model for cloud-based online auction -- Chapter 8. Blockchain for security of cloud-based online auction -- Chapter 9. Performing security on digital images -- Chapter 10. A framework for image encryption on frequency domain -- Chapter 11. Measuring developers' software security skills, usage, and training needs -- Chapter 12. Challenges in agile security engineering: a case study. |
ctrlnum | (CaBNVSL)slc20407596 (OCoLC)1083483565 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>03108nam a2200469 i 4500</leader><controlfield tag="001">ZDB-98-IGB-00199087</controlfield><controlfield tag="003">IGIG</controlfield><controlfield tag="005">20190123082934.0</controlfield><controlfield tag="006">m eo d </controlfield><controlfield tag="007">cr bn |||m|||a</controlfield><controlfield tag="008">190124s2019 pau fob 001 0 eng d</controlfield><datafield tag="010" ind1=" " ind2=" "><subfield code="z"> 2018008109</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522563143</subfield><subfield code="q">eISBN</subfield></datafield><datafield tag="020" ind1=" " ind2=" "><subfield code="z">9781522563136</subfield><subfield code="q">h/c</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-6313-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(CaBNVSL)slc20407596</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1083483565</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">CaBNVSL</subfield><subfield code="b">eng</subfield><subfield code="e">rda</subfield><subfield code="c">CaBNVSL</subfield><subfield code="d">CaBNVSL</subfield></datafield><datafield tag="050" ind1=" " ind2="4"><subfield code="a">QA76.9.A25</subfield><subfield code="b">E996 2018e</subfield></datafield><datafield tag="082" ind1="7" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="0" ind2="0"><subfield code="a">Exploring security in software architecture and design </subfield><subfield code="c">Michael Felderer and Riccardo Scandariato, editor.</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) :</subfield><subfield code="b">IGI Global,</subfield><subfield code="c">[c2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">19 PDFs (349 pages)</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="a">text</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="a">electronic</subfield><subfield code="2">isbdmedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="a">online resource</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="504" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references and index.</subfield></datafield><datafield tag="505" ind1="0" ind2=" "><subfield code="a">Chapter 1. Threat modeling in agile software development -- Chapter 2. Quantitative security assurance -- Chapter 3. Security assurance in agile software development methods: an analysis of Scrum, XP, and Kanban -- Chapter 4. An evaluation of a test-driven security risk analysis approach based on two industrial case studies -- Chapter 5. Modeling and re-evaluating security in an incremental development of RBAC-based systems using b method -- Chapter 6. Designing secure software by testing application of security patterns -- Chapter 7. State actor model for cloud-based online auction -- Chapter 8. Blockchain for security of cloud-based online auction -- Chapter 9. Performing security on digital images -- Chapter 10. A framework for image encryption on frequency domain -- Chapter 11. Measuring developers' software security skills, usage, and training needs -- Chapter 12. Challenges in agile security engineering: a case study.</subfield></datafield><datafield tag="506" ind1=" " ind2=" "><subfield code="a">Restricted to subscribers or individual electronic text purchasers.</subfield></datafield><datafield tag="520" ind1="3" ind2=" "><subfield code="a">"This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"--</subfield><subfield code="c">Provided by publisher.</subfield></datafield><datafield tag="530" ind1=" " ind2=" "><subfield code="a">Also available in print.</subfield></datafield><datafield tag="538" ind1=" " ind2=" "><subfield code="a">Mode of access: World Wide Web.</subfield></datafield><datafield tag="588" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/24/2019).</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Computer security.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software architecture</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="650" ind1=" " ind2="0"><subfield code="a">Software engineering</subfield><subfield code="x">Security measures.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Felderer, Michael,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scandariato, Riccardo,</subfield><subfield code="e">editor.</subfield></datafield><datafield tag="710" ind1="2" ind2=" "><subfield code="a">IGI Global,</subfield><subfield code="e">publisher.</subfield></datafield><datafield tag="776" ind1="0" ind2=" "><subfield code="c">(Original)</subfield><subfield code="w">(DLC)2018008109</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Print version:</subfield><subfield code="z">152256313X</subfield><subfield code="z">9781522563136</subfield><subfield code="w">(DLC) 2018008109</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="l">FWS01</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FWS_PDA_IGB</subfield><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-863</subfield></datafield></record></collection> |
id | ZDB-98-IGB-00199087 |
illustrated | Not Illustrated |
indexdate | 2024-11-26T14:51:53Z |
institution | BVB |
isbn | 9781522563143 |
language | English |
oclc_num | 1083483565 |
open_access_boolean | |
owner | DE-863 DE-BY-FWS |
owner_facet | DE-863 DE-BY-FWS |
physical | 19 PDFs (349 pages) Also available in print. |
psigel | ZDB-98-IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global, |
record_format | marc |
spelling | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor. Hershey, Pennsylvania (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA) : IGI Global, [c2019] 19 PDFs (349 pages) text rdacontent electronic isbdmedia online resource rdacarrier Includes bibliographical references and index. Chapter 1. Threat modeling in agile software development -- Chapter 2. Quantitative security assurance -- Chapter 3. Security assurance in agile software development methods: an analysis of Scrum, XP, and Kanban -- Chapter 4. An evaluation of a test-driven security risk analysis approach based on two industrial case studies -- Chapter 5. Modeling and re-evaluating security in an incremental development of RBAC-based systems using b method -- Chapter 6. Designing secure software by testing application of security patterns -- Chapter 7. State actor model for cloud-based online auction -- Chapter 8. Blockchain for security of cloud-based online auction -- Chapter 9. Performing security on digital images -- Chapter 10. A framework for image encryption on frequency domain -- Chapter 11. Measuring developers' software security skills, usage, and training needs -- Chapter 12. Challenges in agile security engineering: a case study. Restricted to subscribers or individual electronic text purchasers. "This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"-- Provided by publisher. Also available in print. Mode of access: World Wide Web. Description based on title screen (IGI Global, viewed 01/24/2019). Computer security. Software architecture Security measures. Software engineering Security measures. Felderer, Michael, editor. Scandariato, Riccardo, editor. IGI Global, publisher. (Original) (DLC)2018008109 Print version: 152256313X 9781522563136 (DLC) 2018008109 FWS01 ZDB-98-IGB FWS_PDA_IGB http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 Volltext |
spellingShingle | Exploring security in software architecture and design Chapter 1. Threat modeling in agile software development -- Chapter 2. Quantitative security assurance -- Chapter 3. Security assurance in agile software development methods: an analysis of Scrum, XP, and Kanban -- Chapter 4. An evaluation of a test-driven security risk analysis approach based on two industrial case studies -- Chapter 5. Modeling and re-evaluating security in an incremental development of RBAC-based systems using b method -- Chapter 6. Designing secure software by testing application of security patterns -- Chapter 7. State actor model for cloud-based online auction -- Chapter 8. Blockchain for security of cloud-based online auction -- Chapter 9. Performing security on digital images -- Chapter 10. A framework for image encryption on frequency domain -- Chapter 11. Measuring developers' software security skills, usage, and training needs -- Chapter 12. Challenges in agile security engineering: a case study. Computer security. Software architecture Security measures. Software engineering Security measures. |
title | Exploring security in software architecture and design |
title_auth | Exploring security in software architecture and design |
title_exact_search | Exploring security in software architecture and design |
title_full | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor. |
title_fullStr | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor. |
title_full_unstemmed | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor. |
title_short | Exploring security in software architecture and design |
title_sort | exploring security in software architecture and design |
topic | Computer security. Software architecture Security measures. Software engineering Security measures. |
topic_facet | Computer security. Software architecture Security measures. Software engineering Security measures. |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |
work_keys_str_mv | AT felderermichael exploringsecurityinsoftwarearchitectureanddesign AT scandariatoriccardo exploringsecurityinsoftwarearchitectureanddesign AT igiglobal exploringsecurityinsoftwarearchitectureanddesign |