๐”– Scriptorium
โœฆ   LIBER   โœฆ

๐Ÿ“

Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)

โœ Scribed by Michael Felderer (editor), Riccardo Scandariato (editor)


Publisher
Information Science Reference
Year
2018
Tongue
English
Leaves
368
Series
Advances in Information Security, Privacy, and Ethics
Category
Library

โฌ‡  Acquire This Volume

No coin nor oath required. For personal study only.

โœฆ Synopsis


Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts.

โœฆ Table of Contents


Title Page
Copyright Page
Book Series
Table of Contents
Detailed Table of Contents
Preface
Chapter 1: Threat Modeling in Agile Software Development
Chapter 2: Quantitative Security Assurance
Chapter 3: Security Assurance in Agile Software Development Methods
Chapter 4: An Evaluation of a Test-Driven Security Risk Analysis Approach Based on Two Industrial Case Studies
Chapter 5: Modeling and Re-Evaluating Security in an Incremental Development of RBAC-Based Systems Using B Method
Chapter 6: Designing Secure Software by Testing Application of Security Patterns
Chapter 7: State Actor Model for Cloud-Based Online Auction
Chapter 8: Blockchain for Security of Cloud-Based Online Auction
Chapter 9: Performing Security on Digital Images
Chapter 10: A Framework for Image Encryption on Frequency Domain
Chapter 11: Measuring Developers' Software Security Skills, Usage, and Training Needs
Chapter 12: Challenges in Agile Security Engineering
Compilation of References
About the Contributors
Index


๐Ÿ“œ SIMILAR VOLUMES


Establishing Cyber Security Programs Thr
โœ Natalie Sjelin (editor) ๐Ÿ“‚ Library ๐Ÿ“… 2020 ๐Ÿ› IGI Global ๐ŸŒ English

<p>As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeab

Handbook of Research on Cyber Law, Data
โœ Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (edit ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Information Science Reference ๐ŸŒ English

<span>"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privac

Handbook of Research on Cyber Law, Data
โœ Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (edit ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Information Science Reference ๐ŸŒ English

<span>"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privac

Handbook of Research on Cyber Law, Data
โœ Nisha Dhanraj Dewani (editor), Zubair Ahmed Khan (editor), Aarushi Agarwal (edit ๐Ÿ“‚ Library ๐Ÿ“… 2022 ๐Ÿ› Information Science Reference ๐ŸŒ English

<span>"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privac