Security-Aware Systems Applications and Software Development Methods

Security-Aware Systems Applications and Software Development Methods

Copyright: © 2012 |Pages: 416
ISBN13: 9781466615809|ISBN10: 146661580X|EISBN13: 9781466615816
DOI: 10.4018/978-1-4666-1580-9
Cite Book Cite Book

MLA

Khan, Khaled M., editor. Security-Aware Systems Applications and Software Development Methods. IGI Global, 2012. https://doi.org/10.4018/978-1-4666-1580-9

APA

Khan, K. M. (Ed.). (2012). Security-Aware Systems Applications and Software Development Methods. IGI Global. https://doi.org/10.4018/978-1-4666-1580-9

Chicago

Khan, Khaled M., ed. Security-Aware Systems Applications and Software Development Methods. Hershey, PA: IGI Global, 2012. https://doi.org/10.4018/978-1-4666-1580-9

Export Reference

Mendeley
Favorite Full-Book Download

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design.

Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Secure Software Development Process
This content has been removed at the discretion of the publisher and the editors.
Security Requirements Analysis and Modeling
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Vulnerability Detection  (pages 129-129)
Vulnerability Detection
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Protection Mechanisms  (pages 168-168)
Protection Mechanisms
This content has been removed at the discretion of the publisher and the editors.
Chapter 5
Tools for Security-Aware Development
This content has been removed at the discretion of the publisher and the editors.
Chapter 6
Secure Software Education and Training
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.