Back to Search results for [ null ]

Developing and evaluating security-a...
Khan, Khaled M., (1959-)

Linked to FindBook      Google Book      Amazon      博客來     
  • Developing and evaluating security-aware software systems
  • Record Type: Electronic resources : Monograph/item
    Title/Author: Developing and evaluating security-aware software systems/ Khaled M. Khan, editor.
    other author: Khan, Khaled M.,
    Published: Hershey, Pa. :IGI Global (701 E. Chocolate Avenue, Hershey, Pennsylvania, 17033, USA), : c2013.,
    Description: electronic texts (308 p.) :digital files.
    [NT 15003449]: Secure by design: developing secure software systems from the ground up / Haralambos Mouratidis, Miao Kang -- Security evaluation of service-oriented systems using the SiSOA method / Christian Jung, Manuel Rudolph, Reinhard Schwarz -- Eliciting policy requirements for critical national infrastructure using the IRIS framework / Shamal Faily, Ivan Flechais -- Organizational patterns for security and dependability: from design to application / Yudis Asnar ... [et al.] -- Not ready for prime time: a survey on security in model driven development / Jostein Jensen, Martin Gilje Jaatun -- Security gaps in databases: a comparison of alternative software products for web applications support / Afonso Araujo Neto, Marco Vieira -- Using executable slicing to improve rogue software detection algorithms / Jan Durand ... [et al.] -- Ell secure information system using modal logic technique / Yun Bai, Khaled M. Khan -- A formal language for XML authorisations based on answer set programming and temporal interval logic constraints / Sean Policarpio, Yan Zhang -- Building secure software using XP / Walid Al-Ahmad -- Analysis of ANSI RBAC support in EJB / Wesam Darwish, Konstantin Beznosov -- Performance evaluation of secure key deployment and exchange protocol for MANETs / Alastair Nisbet, M. A. Rashid -- JavaSPI: a framework for security protocol implementation / Matteo Avalle ... [et al.] -- A systematic empirical analysis of forging fingerprints to fool biometric systems / Christian Schwarzl, Edgar Weippl -- Integrating patient consent in e-health access control / Kim Wuyts ... [et al.].
    Subject: Computer networks - Security measures. -
    Online resource: http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-4666-2482-5
    ISBN: 9781466624832 (ebook)
Location:  Year:  Volume Number: 
Items
  • 1 records • Pages 1 •
 
W9269431 電子資源 11.線上閱覽_V 電子書 EB TK5105.59 .D48 2013e 一般使用(Normal) On shelf 0
  • 1 records • Pages 1 •
Multimedia
Reviews
Export
pickup library
 
 
Change password
Login

(1)User name(Patron ID)Please enter your student ID number or passport number. (2)Password:Please enter the last four digits of your Patron ID.

.
.