Indices1
Developing and Evaluating Security-Aware Software Systems

Developing and Evaluating Security-Aware Software Systems

Copyright: © 2013 |Pages: 367
ISBN13: 9781466624825|ISBN10: 1466624825|EISBN13: 9781466624832
DOI: 10.4018/978-1-4666-2482-5
Cite Book Cite Book

MLA

Khan, Khaled M., editor. Developing and Evaluating Security-Aware Software Systems. IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2482-5

APA

Khan, K. M. (Ed.). (2013). Developing and Evaluating Security-Aware Software Systems. IGI Global. https://doi.org/10.4018/978-1-4666-2482-5

Chicago

Khan, Khaled M., ed. Developing and Evaluating Security-Aware Software Systems. Hershey, PA: IGI Global, 2013. https://doi.org/10.4018/978-1-4666-2482-5

Export Reference

Mendeley
Favorite Full-Book Download

As computer technologies continue to evolve and new security threats emerge, secure-aware software developments are essential in the software engineering field.

Developing and Evaluating Security-Aware Software Systems provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and aims to highlight the construction of a functional software system and a secure system simultaneously. This book is practical for researchers, academics and practitioners in the software engineering and security fields.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Software Development Process
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Formal Techniques and Tools
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Standard Security Functions
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.