Exploring Security in Software Architecture and Design (Advances in Information Security, Privacy, and Ethics)
โ Scribed by Michael Felderer (editor), Riccardo Scandariato (editor)
- Publisher
- Information Science Reference
- Year
- 2018
- Tongue
- English
- Leaves
- 368
- Series
- Advances in Information Security, Privacy, and Ethics
- Category
- Library
No coin nor oath required. For personal study only.
โฆ Synopsis
Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed. Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts.
โฆ Table of Contents
Title Page
Copyright Page
Book Series
Table of Contents
Detailed Table of Contents
Preface
Chapter 1: Threat Modeling in Agile Software Development
Chapter 2: Quantitative Security Assurance
Chapter 3: Security Assurance in Agile Software Development Methods
Chapter 4: An Evaluation of a Test-Driven Security Risk Analysis Approach Based on Two Industrial Case Studies
Chapter 5: Modeling and Re-Evaluating Security in an Incremental Development of RBAC-Based Systems Using B Method
Chapter 6: Designing Secure Software by Testing Application of Security Patterns
Chapter 7: State Actor Model for Cloud-Based Online Auction
Chapter 8: Blockchain for Security of Cloud-Based Online Auction
Chapter 9: Performing Security on Digital Images
Chapter 10: A Framework for Image Encryption on Frequency Domain
Chapter 11: Measuring Developers' Software Security Skills, Usage, and Training Needs
Chapter 12: Challenges in Agile Security Engineering
Compilation of References
About the Contributors
Index
๐ SIMILAR VOLUMES
<p>As society continues to heavily rely on software and databases, the risks for cyberattacks have increased rapidly. As the dependence on computers has become gradually widespread throughout communities and governments, there is a need for cybersecurity programs that can assist in protecting sizeab
<span>"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privac
<span>"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privac
<span>"This handbook examines the legislations on internet, data security and their effects on user engagement and cyber-crime while contextualizing the inter- relationship between technology and law and addressing the need for additional regulations to safeguard user identification, data and privac
"This book explores the use of machine learning and deep learning applications in the areas of cyber security and cyber-attack handling mechanisms"--