Reference Hub2
Indices1
Software Engineering for Secure Systems: Industrial and Research Perspectives

Software Engineering for Secure Systems: Industrial and Research Perspectives

Copyright: © 2011 |Pages: 388
ISBN13: 9781615208371|ISBN10: 1615208372|EISBN13: 9781615208388
DOI: 10.4018/978-1-61520-837-1
Cite Book Cite Book

MLA

Mouratidis, H., editor. Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global, 2011. https://doi.org/10.4018/978-1-61520-837-1

APA

Mouratidis, H. (Ed.). (2011). Software Engineering for Secure Systems: Industrial and Research Perspectives. IGI Global. https://doi.org/10.4018/978-1-61520-837-1

Chicago

Mouratidis, H., ed. Software Engineering for Secure Systems: Industrial and Research Perspectives. Hershey, PA: IGI Global, 2011. https://doi.org/10.4018/978-1-61520-837-1

Export Reference

Mendeley
Favorite Full-Book Download

The security of software systems in recent years has been transformed from a mono-dimensional technical challenge to a multi-dimensional technico-social challenge, due to the wide usage of software systems in almost every area of the human life. This situation requires a different and more holistic approach to the development of secure software systems.

Software Engineering for Secure Systems: Industrial and Research Perspectives presents the most recent and innovative lines of research and industrial practice related to secure software engineering. The book provides coverage of recent advances in the area of secure software engineering that address the various stages of the development process from requirements to design to testing to implementation. Contributions offer a comprehensive understanding secure software engineering, inspire and motivate further research and development, and bridge the gap between academic research and industrial practice.

Table of Contents

Reset
Front Materials
Title Page
This content has been removed at the discretion of the publisher and the editors.
Copyright Page
This content has been removed at the discretion of the publisher and the editors.
Editorial Advisory Board
This content has been removed at the discretion of the publisher and the editors.
Foreword
This content has been removed at the discretion of the publisher and the editors.
Preface
This content has been removed at the discretion of the publisher and the editors.
Acknowledgment
This content has been removed at the discretion of the publisher and the editors.
Chapters
Chapter 1
Security Patterns  (pages 15-15)
Security Patterns
This content has been removed at the discretion of the publisher and the editors.
Chapter 2
Methodologies and Frameworks
This content has been removed at the discretion of the publisher and the editors.
Chapter 3
Privacy and Trust  (pages 211-211)
Privacy and Trust
This content has been removed at the discretion of the publisher and the editors.
Chapter 4
Secure Code Analysis  (pages 285-285)
Secure Code Analysis
This content has been removed at the discretion of the publisher and the editors.
Back Materials
Compilation of References
This content has been removed at the discretion of the publisher and the editors.
About the Contributors
This content has been removed at the discretion of the publisher and the editors.
Index
This content has been removed at the discretion of the publisher and the editors.

Request Access

You do not own this content. Please login to recommend this title to your institution's librarian or purchase it from the IGI Global bookstore.