Cargando…

Empirical Research for Software Security : Foundations and Experience.

"Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Ben Othmane, Lotfi
Otros Autores: Jaatun, Martin Gilje, Weippl, Edgar
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Milton : CRC Press, 2017.
Colección:Series in security, privacy, and trust.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000Mi 4500
001 EBOOKCENTRAL_on1015867817
003 OCoLC
005 20240329122006.0
006 m o d
007 cr |n|---|||||
008 171223s2017 xx o 000 0 eng d
040 |a EBLCP  |b eng  |e pn  |c EBLCP  |d TYFRS  |d OCLCO  |d OCLCQ  |d WYU  |d UKAHL  |d UX1  |d OCLCO  |d OCLCF  |d NLW  |d OCLCQ  |d SDF  |d RDF  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCL 
019 |a 1118335561  |a 1275023245 
020 |a 9781498776424 
020 |a 1498776426 
020 |a 9781351650885  |q (EPUB) 
020 |a 1351650882  |q (EPUB) 
029 1 |a AU@  |b 000062571093 
035 |a (OCoLC)1015867817  |z (OCoLC)1118335561  |z (OCoLC)1275023245 
037 |a 9781351650885  |b Ingram Content Group 
050 4 |a QA76.9.A25  |b E47 2018 
082 0 4 |a 005.8  |2 23 
049 |a UAMI 
100 1 |a Ben Othmane, Lotfi. 
245 1 0 |a Empirical Research for Software Security :  |b Foundations and Experience. 
260 |a Milton :  |b CRC Press,  |c 2017. 
300 |a 1 online resource (323 pages) 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a Series in Security, Privacy and Trust 
588 0 |a Print version record. 
505 0 |a Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; List of Figures; List of Tables; Contributors; 1: Empirical Research on Security and Privacy by Design; 1.1 Introduction; 1.2 Empirical Research on Security and Privacy by Design; 1.3 Scoping; 1.4 Planning; 1.5 Operation; 1.6 Analysis and Interpretation; 1.7 Presentation and Packaging; 1.8 Conclusion; 2: Guidelines for Systematic Mapping Studies in Security Engineering; 2.1 Introduction; 2.2 Background on Systematic Mapping Studies in Software Engineering. 
505 8 |a 2.3 Overview of Available Mapping Studies in Security Engineering2.4 Guidelines for Systematic Mapping Studies in Security Engineering; 2.5 Summary; 3: An Introduction to Data Analytics for Software Security; 3.1 Introduction; 3.2 Secure Software Development; 3.3 Software Security Analytical Process; 3.4 Learning Methods Used in Software Security; 3.5 Evaluation of Model Performance; 3.6 More Lessons Learned; 3.7 Conclusion; 3.8 Acknowledgment; 4: Generating Software Security Knowledge Through Empirical Methods; 4.1 Introduction and Motivation; 4.2 Empirical Methods for Knowledge Generation. 
505 8 |a 4.3 Example Application Domain: Secure Software Development Research Project4.4 Experiments; 4.5 Systematic Literature Mappings; 4.6 Case Studies; 4.7 Experimental Replications; 4.8 Conclusions; 4.9 Acknowledgment; 5: Visual Analytics: Foundations and Experiences in Malware Analysis; 5.1 Introduction; 5.2 Background in Malware Analysis; 5.3 Visual Analytics Foundations; 5.4 The Knowledge Generation Process; 5.5 Design and Evaluation for Visual Analytics Systems; 5.6 Experience in Malware Analysis; 5.7 Future Directions; 5.8 Conclusions. 
505 8 |a 6: Analysis of Metrics for Classification Accuracy in Intrusion Detection6.1 Introduction; 6.2 Evaluation Metrics; 6.3 Literature Review; 6.4 What Hinders Adoption of Alternative Metrics; 6.5 Guidelines for Introducing New Evaluation Metrics; 6.6 Conclusions; 6.7 Acknowledgement; 7: The Building Security in Maturity Model as a Research Tool; 7.1 Introduction; 7.2 Background; 7.3 Questionnaires in Software Security; 7.4 A Case Study; 7.5 Discussion; 7.6 Conclusion; 8: Agile Test Automation for Web Applicationsâ#x80;#x94; A Security Perspective; 8.1 Introduction; 8.2 Methodology; 8.3 Risk Assessment. 
505 8 |a 8.4 Testing and Test Automation from the Security Perspective8.5 Static Analysis Tools; 8.6 Dynamic Analysis Tools and Frameworks; 8.7 Evaluating Static/Dynamic Analysis Tools and Frameworks; 8.8 Appraisal of the Tools; 8.9 Conclusion; 9: Benchmark for Empirical Evaluation of Web Application Anomaly Detectors; 9.1 Introduction; 9.2 Literature Review; 9.3 Benchmark Characteristics for Application-Layer Attack Detection Approaches; 9.4 An Example Environment for Generating Benchmark Data; 9.5 Using the Benchmark Dataset to Evaluate an IDS; 9.6 Conclusion. 
500 |a 10: Threats to Validity in Empirical Software Security Research. 
520 2 |a "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher. 
506 1 |a Legal Deposit;  |c Only available on premises controlled by the deposit library and to one user at any one time;  |e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).  |5 WlAbNL 
540 |a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.  |5 WlAbNL 
590 |a ProQuest Ebook Central  |b Ebook Central Academic Complete 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 0 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 0 7 |a COMPUTERS  |x Computer Engineering.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
700 1 |a Jaatun, Martin Gilje. 
700 1 |a Weippl, Edgar. 
758 |i has work:  |a Empirical research for software security (Text)  |1 https://id.oclc.org/worldcat/entity/E39PCGX464dtk6BYQGp89mQgDm  |4 https://id.oclc.org/worldcat/ontology/hasWork 
776 0 8 |i Print version:  |a Ben Othmane, Lotfi.  |t Empirical Research for Software Security : Foundations and Experience.  |d Milton : CRC Press, ©2017  |z 9781498776417 
830 0 |a Series in security, privacy, and trust. 
856 4 0 |u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5164090  |z Texto completo 
938 |a Askews and Holts Library Services  |b ASKH  |n AH33772210 
938 |a Askews and Holts Library Services  |b ASKH  |n AH32536585 
938 |a ProQuest Ebook Central  |b EBLB  |n EBL5164090 
938 |a Taylor & Francis  |b TAFR  |n 9781315154855 
994 |a 92  |b IZTAP