Cargando…

System assurance : beyond detecting vulnerabilities /

In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion. System Assurance:...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Autor principal: Mansourov, Nikolai
Otros Autores: Campara, Djenana
Formato: Electrónico eBook
Idioma:Inglés
Publicado: San Francisco, Calif. : Oxford : Morgan Kaufmann ; Elsevier Science [distributor], 2010.
Colección:MK/OMG press.
Temas:
Acceso en línea:Texto completo (Requiere registro previo con correo institucional)

MARC

LEADER 00000cam a2200000 a 4500
001 OR_ocn694441102
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 101228s2010 caua ob 001 0 eng d
040 |a OPELS  |b eng  |e pn  |c OPELS  |d OCLCQ  |d YDXCP  |d BWX  |d CDX  |d DKDLA  |d MHW  |d OCLCO  |d OCLCQ  |d OCLCF  |d OCLCQ  |d UKDOC  |d UMI  |d CGU  |d COO  |d DEBSZ  |d VLB  |d B24X7  |d OCLCQ  |d ESU  |d OCLCQ  |d OCLCA  |d D6H  |d INT  |d OCLCQ  |d WYU  |d OCLCQ  |d AUD  |d LEAUB  |d VT2  |d OCLCQ  |d S2H  |d OCLCO  |d OCLCQ  |d OCLCO  |d OCLCQ  |d OCLCO 
019 |a 610157510  |a 711050986  |a 728767422  |a 771390219  |a 795224971  |a 1014085921  |a 1103252835  |a 1129360638 
020 |a 9780123814142  |q (electronic bk.) 
020 |a 0123814146  |q (electronic bk.) 
020 |a 9780123814159 
020 |a 0123814154 
024 3 |a 9780123814142 
029 1 |a AU@  |b 000048803405 
029 1 |a AU@  |b 000057227566 
029 1 |a AU@  |b 000067107340 
029 1 |a CHNEW  |b 001009992 
029 1 |a DEBBG  |b BV039827100 
029 1 |a DEBBG  |b BV042300716 
029 1 |a DEBSZ  |b 367744880 
029 1 |a DEBSZ  |b 370594304 
029 1 |a NZ1  |b 13761758 
029 1 |a NZ1  |b 15187771 
035 |a (OCoLC)694441102  |z (OCoLC)610157510  |z (OCoLC)711050986  |z (OCoLC)728767422  |z (OCoLC)771390219  |z (OCoLC)795224971  |z (OCoLC)1014085921  |z (OCoLC)1103252835  |z (OCoLC)1129360638 
037 |a 1092289:10870061  |b Elsevier Science & Technology  |n http://www.sciencedirect.com 
050 4 |a QA76.9.A25  |b M36 2010 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
100 1 |a Mansourov, Nikolai. 
245 1 0 |a System assurance :  |b beyond detecting vulnerabilities /  |c Nikolai Mansourov, Djenana Campara. 
260 |a San Francisco, Calif. :  |b Morgan Kaufmann ;  |a Oxford :  |b Elsevier Science [distributor],  |c 2010. 
300 |a 1 online resource 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a The MK/OMG press 
520 |a In this day of frequent acquisitions and perpetual application integrations, systems are often an amalgamation of multiple programming languages and runtime platforms using new and legacy content. Systems of such mixed origins are increasingly vulnerable to defects and subversion. System Assurance: Beyond Detecting Vulnerabilities addresses these critical issues. As a practical resource for security analysts and engineers tasked with system assurance, the book teaches you how to use the Object Management Group's (OMG) expertise and unique standards to obtain accurate knowledge about your existing software and compose objective metrics for system assurance. OMG's Assurance Ecosystem provides a common framework for discovering, integrating, analyzing, and distributing facts about your existing enterprise software. Its foundation is the standard protocol for exchanging system facts, defined as the OMG Knowledge Discovery Metamodel (KDM). In addition, the Semantics of Business Vocabularies and Business Rules (SBVR) defines a standard protocol for exchanging security policy rules and assurance patterns. Using these standards together, you will learn how to leverage the knowledge of the cybersecurity community and bring automation to protect your system. Provides end-to-end methodology for systematic, repeatable, and affordable System Assurance. Includes an overview of OMG Software Assurance Ecosystem protocols that integrate risk, architecture and code analysis guided by the assurance argument. Case Study illustrating the steps of the System Assurance Methodology using automated tools. 
505 0 |a Why Hackers know more about our systems -- Confidence as a Product -- How to Build Confidence -- Knowledge of System as of Element in Cybersecurity argument -- Knowledge of Risk as an Element of Cybersecurity argument -- Knowledge of Vulnerabilities as an Element of Cybersecurity Argument -- Vulnerability Patterns as a New Assurance Content -- OMG Software Assurance Ecosystem -- Common Fact Model for Assurance Content -- Linguistic Models -- Standard Protocol for Exchanging System Facts -- Case Study. 
588 0 |a Print version record. 
504 |a Includes bibliographical references and index. 
590 |a O'Reilly  |b O'Reilly Online Learning: Academic/Public Library Edition 
650 0 |a Computer security. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 7 |a Computer security  |2 fast 
700 1 |a Campara, Djenana. 
776 0 8 |i Print version:  |a Mansourov, Nikolai.  |t System assurance.  |d San Francisco, Calif. : Morgan Kaufmann ; Oxford : Elsevier Science [distributor], 2010  |z 9780123814142  |w (OCoLC)655650470 
830 0 |a MK/OMG press. 
856 4 0 |u https://learning.oreilly.com/library/view/~/9780123814142/?ar  |z Texto completo (Requiere registro previo con correo institucional) 
938 |a 123Library  |b 123L  |n 37207 
938 |a Books 24x7  |b B247  |n bks00041885 
938 |a Coutts Information Services  |b COUT  |n 17157334 
938 |a YBP Library Services  |b YANK  |n 3250474 
994 |a 92  |b IZTAP