Advances in computers. Volume 102 /
Advances in Computers, an ongoing series since 1960, presents detailed coverage of innovations in computer hardware, software, theory, design, and applications. It has also provided contributors with a medium in which they can explore their subjects in greater depth and breadth than journal articles...
Clasificación: | Libro Electrónico |
---|---|
Otros Autores: | , |
Formato: | Electrónico eBook |
Idioma: | Inglés |
Publicado: |
Amsterdam :
Academic Press,
2016.
|
Colección: | Advances in Computers ;
Volume 102 |
Temas: | |
Acceso en línea: | Texto completo |
Tabla de Contenidos:
- Front Cover; Advances in Computers; Copyright; Contents; Preface; Chapter One: Advances in Software Engineering and Software Assurance; 1. Introduction; 2. Structured Programming: The Dawn of a New Era; 2.1. The GOTO Statement; 2.2. Structured Programming as a Solution; 2.3. IBM Training; 3. Language Support for Structured Programming; 3.1. FORTRAN; 3.2. ALGOL 60; 3.3. Intersection of Languages and a New Paradigm; 3.4. Software Engineering; 3.5. SE Education; 4. Computing Meets Reality: The Protection of Information in Computers; 4.1. The SAGE and SABRE Networks; 4.2. ARPANET
- 4.3. Crime and Computers4.4. Strategies for Protecting Data; 4.5. Technology and Threats Converge; 4.6. Before the Internet; 4.7. Software Assurance; 5. Security Gets Serious: Societal Responses and the Morris Worm; 5.1. Computer Viruses; 5.2. Viruses ``In the Wild��; 5.3. The Morris Worm; 5.4. The Computer Fraud and Abuse Act; 5.5. Punishment Under the Law; 5.6. The CERT/CC; 6. Software as a Commodity and the Rise of the SE Best Practice Approach; 6.1. Personal Computers; 6.2. Application Software; 6.3. Flawed Software Development; 6.4. The Software Engineering Institute
- 6.5. Master�s in Software Engineering6.6. Software Process; 6.7. WGSEET; 6.8. Undergraduate Software Development Degrees; 6.9. SE as a Profession; 7. The Rise of the Internet and the Advent of Formal Software and System Security Programs; 7.1. The Early Internet; 7.2. Computer Security and the Growing Internet; 7.3. Organized Incident Response; 7.4. Incident Management; 7.5. Malware; 7.6. The Need for Defect-Free Software; 7.6.1. Build Security In; 7.6.2. CWE Project; 7.7. Summary; 8. Cybersecurity Becomes a Societal Issue: Legal Frameworks; 8.1. The E-Government Act of 2002
- 8.2. Federal Information Security Management Act (FISMA)8.2.1. Standards, Guidelines, and Associated Methods and Techniques; 8.2.2. Security Requirements; 8.3. Summary; 9. Complexity and Supply Chains: The Need for Broad-Scale Integration; 9.1. Integrated Complex Applications; 9.2. Component Complexity and Virtuality; 9.3. The Technology Supply Chain; 9.3.1. Risks to Critical Infrastructure; 9.3.2. Supply Chain Risk Management (SCRM); 9.4. Summary; 10. Where We Are Now; Acknowledgments; References; Chapter Two: Privacy Challenges and Goals in mHealth Systems; 1. Introduction
- 2. Technologies Used in mHealth3. Major Privacy Challenges; 3.1. Privacy Challenges While Using Radio Frequency Identification in mHealth Application; 3.2. Privacy Challenges in Cell Phone-Based mHealth Services; 3.3. Privacy Challenges in Social Networking and Care Coordination Technologies; 4. Significance of Privacy in mHealth; 5. Solving Privacy Problems with Various Methods; 5.1. Encryption Methods; 5.2. Access Control Mechanisms; 5.3. Remote Data Checking Using Provable Data Possession; 5.4. Privacy-Preserving Data Integrity Checking; 5.5. Privacy-Preserving Public Auditability