|
|
|
|
LEADER |
00000cam a2200000Mi 4500 |
001 |
EBOOKCENTRAL_on1015867817 |
003 |
OCoLC |
005 |
20240329122006.0 |
006 |
m o d |
007 |
cr |n|---||||| |
008 |
171223s2017 xx o 000 0 eng d |
040 |
|
|
|a EBLCP
|b eng
|e pn
|c EBLCP
|d TYFRS
|d OCLCO
|d OCLCQ
|d WYU
|d UKAHL
|d UX1
|d OCLCO
|d OCLCF
|d NLW
|d OCLCQ
|d SDF
|d RDF
|d OCLCO
|d OCLCQ
|d OCLCO
|d OCLCL
|
019 |
|
|
|a 1118335561
|a 1275023245
|
020 |
|
|
|a 9781498776424
|
020 |
|
|
|a 1498776426
|
020 |
|
|
|a 9781351650885
|q (EPUB)
|
020 |
|
|
|a 1351650882
|q (EPUB)
|
029 |
1 |
|
|a AU@
|b 000062571093
|
035 |
|
|
|a (OCoLC)1015867817
|z (OCoLC)1118335561
|z (OCoLC)1275023245
|
037 |
|
|
|a 9781351650885
|b Ingram Content Group
|
050 |
|
4 |
|a QA76.9.A25
|b E47 2018
|
082 |
0 |
4 |
|a 005.8
|2 23
|
049 |
|
|
|a UAMI
|
100 |
1 |
|
|a Ben Othmane, Lotfi.
|
245 |
1 |
0 |
|a Empirical Research for Software Security :
|b Foundations and Experience.
|
260 |
|
|
|a Milton :
|b CRC Press,
|c 2017.
|
300 |
|
|
|a 1 online resource (323 pages)
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a Series in Security, Privacy and Trust
|
588 |
0 |
|
|a Print version record.
|
505 |
0 |
|
|a Cover; Half Title; Title Page; Copyright Page; Table of Contents; Preface; List of Figures; List of Tables; Contributors; 1: Empirical Research on Security and Privacy by Design; 1.1 Introduction; 1.2 Empirical Research on Security and Privacy by Design; 1.3 Scoping; 1.4 Planning; 1.5 Operation; 1.6 Analysis and Interpretation; 1.7 Presentation and Packaging; 1.8 Conclusion; 2: Guidelines for Systematic Mapping Studies in Security Engineering; 2.1 Introduction; 2.2 Background on Systematic Mapping Studies in Software Engineering.
|
505 |
8 |
|
|a 2.3 Overview of Available Mapping Studies in Security Engineering2.4 Guidelines for Systematic Mapping Studies in Security Engineering; 2.5 Summary; 3: An Introduction to Data Analytics for Software Security; 3.1 Introduction; 3.2 Secure Software Development; 3.3 Software Security Analytical Process; 3.4 Learning Methods Used in Software Security; 3.5 Evaluation of Model Performance; 3.6 More Lessons Learned; 3.7 Conclusion; 3.8 Acknowledgment; 4: Generating Software Security Knowledge Through Empirical Methods; 4.1 Introduction and Motivation; 4.2 Empirical Methods for Knowledge Generation.
|
505 |
8 |
|
|a 4.3 Example Application Domain: Secure Software Development Research Project4.4 Experiments; 4.5 Systematic Literature Mappings; 4.6 Case Studies; 4.7 Experimental Replications; 4.8 Conclusions; 4.9 Acknowledgment; 5: Visual Analytics: Foundations and Experiences in Malware Analysis; 5.1 Introduction; 5.2 Background in Malware Analysis; 5.3 Visual Analytics Foundations; 5.4 The Knowledge Generation Process; 5.5 Design and Evaluation for Visual Analytics Systems; 5.6 Experience in Malware Analysis; 5.7 Future Directions; 5.8 Conclusions.
|
505 |
8 |
|
|a 6: Analysis of Metrics for Classification Accuracy in Intrusion Detection6.1 Introduction; 6.2 Evaluation Metrics; 6.3 Literature Review; 6.4 What Hinders Adoption of Alternative Metrics; 6.5 Guidelines for Introducing New Evaluation Metrics; 6.6 Conclusions; 6.7 Acknowledgement; 7: The Building Security in Maturity Model as a Research Tool; 7.1 Introduction; 7.2 Background; 7.3 Questionnaires in Software Security; 7.4 A Case Study; 7.5 Discussion; 7.6 Conclusion; 8: Agile Test Automation for Web Applicationsâ#x80;#x94; A Security Perspective; 8.1 Introduction; 8.2 Methodology; 8.3 Risk Assessment.
|
505 |
8 |
|
|a 8.4 Testing and Test Automation from the Security Perspective8.5 Static Analysis Tools; 8.6 Dynamic Analysis Tools and Frameworks; 8.7 Evaluating Static/Dynamic Analysis Tools and Frameworks; 8.8 Appraisal of the Tools; 8.9 Conclusion; 9: Benchmark for Empirical Evaluation of Web Application Anomaly Detectors; 9.1 Introduction; 9.2 Literature Review; 9.3 Benchmark Characteristics for Application-Layer Attack Detection Approaches; 9.4 An Example Environment for Generating Benchmark Data; 9.5 Using the Benchmark Dataset to Evaluate an IDS; 9.6 Conclusion.
|
500 |
|
|
|a 10: Threats to Validity in Empirical Software Security Research.
|
520 |
2 |
|
|a "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher.
|
506 |
1 |
|
|a Legal Deposit;
|c Only available on premises controlled by the deposit library and to one user at any one time;
|e The Legal Deposit Libraries (Non-Print Works) Regulations (UK).
|5 WlAbNL
|
540 |
|
|
|a Restricted: Printing from this resource is governed by The Legal Deposit Libraries (Non-Print Works) Regulations (UK) and UK copyright law currently in force.
|5 WlAbNL
|
590 |
|
|
|a ProQuest Ebook Central
|b Ebook Central Academic Complete
|
650 |
|
0 |
|a Computer security.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
0 |
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
0 |
7 |
|a COMPUTERS
|x Computer Engineering.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
700 |
1 |
|
|a Jaatun, Martin Gilje.
|
700 |
1 |
|
|a Weippl, Edgar.
|
758 |
|
|
|i has work:
|a Empirical research for software security (Text)
|1 https://id.oclc.org/worldcat/entity/E39PCGX464dtk6BYQGp89mQgDm
|4 https://id.oclc.org/worldcat/ontology/hasWork
|
776 |
0 |
8 |
|i Print version:
|a Ben Othmane, Lotfi.
|t Empirical Research for Software Security : Foundations and Experience.
|d Milton : CRC Press, ©2017
|z 9781498776417
|
830 |
|
0 |
|a Series in security, privacy, and trust.
|
856 |
4 |
0 |
|u https://ebookcentral.uam.elogim.com/lib/uam-ebooks/detail.action?docID=5164090
|z Texto completo
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH33772210
|
938 |
|
|
|a Askews and Holts Library Services
|b ASKH
|n AH32536585
|
938 |
|
|
|a ProQuest Ebook Central
|b EBLB
|n EBL5164090
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9781315154855
|
994 |
|
|
|a 92
|b IZTAP
|