Cargando…

Empirical research for software security : foundations and experience /

"Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that...

Descripción completa

Detalles Bibliográficos
Clasificación:Libro Electrónico
Otros Autores: Othmane, Lotfi ben, Jaatun, Martin Gilje, Weippl, Edgar R.
Formato: Electrónico eBook
Idioma:Inglés
Publicado: Boca Raton, FL : CRC Press, [2018]
Edición:First edition.
Colección:Series in security, privacy, and trust.
Temas:
Acceso en línea:Texto completo

MARC

LEADER 00000cam a2200000 i 4500
001 EBSCO_on1003994047
003 OCoLC
005 20231017213018.0
006 m o d
007 cr cn|||||||||
008 171114s2018 flu ob 001 0 eng d
040 |a CRCPR  |b eng  |e rda  |e pn  |c CRCPR  |d IDEBK  |d N$T  |d STF  |d N$T  |d YDX  |d OCLCA  |d OCLCF  |d MCW  |d CAUOI  |d OCLCQ  |d OCLCO  |d ERL  |d OCLCA  |d MERER  |d CEF  |d OCLCQ  |d UPM  |d U3W  |d BNG  |d TYFRS  |d LOA  |d OCLCQ  |d K6U  |d VT2  |d OCLCQ  |d OCLCO  |d OCLCQ  |d ELBRO  |d OCLCO  |d OCLCQ  |d SFB  |d OCLCQ  |d OCLCO 
019 |a 993948992  |a 1031041166  |a 1079402392  |a 1135389353  |a 1192329700  |a 1193985831  |a 1228540254 
020 |a 9781315154855  |q (electronic bk.) 
020 |a 1315154854  |q (electronic bk.) 
020 |a 9781498776424  |q (electronic bk.) 
020 |a 1498776426  |q (electronic bk.) 
020 |z 9781498776417 
020 |z 1498776418 
029 1 |a AU@  |b 000065169279 
029 1 |a CHBIS  |b 011432013 
029 1 |a CHVBK  |b 567510425 
035 |a (OCoLC)1003994047  |z (OCoLC)993948992  |z (OCoLC)1031041166  |z (OCoLC)1079402392  |z (OCoLC)1135389353  |z (OCoLC)1192329700  |z (OCoLC)1193985831  |z (OCoLC)1228540254 
050 4 |a QA76.9.A25 
072 7 |a COM  |x 059000  |2 bisacsh 
072 7 |a COM  |x 053000  |2 bisacsh 
082 0 4 |a 005.8  |2 22 
049 |a UAMI 
245 0 0 |a Empirical research for software security :  |b foundations and experience /  |c edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. 
250 |a First edition. 
264 1 |a Boca Raton, FL :  |b CRC Press,  |c [2018] 
300 |a 1 online resource (xxviii, 340 pages) :  |b 43 black and white images, 57 tables, 29 halftones and 14 line drawings 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
490 1 |a CRC series in security, privacy and trust 
520 2 |a "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher 
504 |a Includes bibliographical references and index. 
505 0 0 |t Empirical research on security and privacy by design /  |r Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen --  |t Guidelines for systematic mapping studies in security engineering /  |r Michael Felderer and Jeffrey C. Carver --  |t Introduction to data analytics for software security /  |r Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski --  |t Generating software security knowledge through empirical methods /  |r René Noël, Santiago Matalonga, Gilberto Pedraza, Hernán Astudillo, and Eduardo B. Fernandez --  |t Visual analytics : foundations and experiences in malware analysis /  |r Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Rischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner --  |t Analysis of metrics for classification accuracy in intrusion detection /  |r Natalia Stakhanova and Alvaro A. Cardenas --  |t Building security in maturity model as a research tool /  |r Martin Gilje Jaatun --  |t Agile test automation for web applications : a security perspective /  |r Sandra Domenique Ringmann and Hanno Langweg --  |t Benchmark for empirical evaluation of web application anomaly detectors /  |r Robert Bronte, Hossain Shahriar, and Hisham Haddad --  |t Threats to validity in empirical software security research /  |r Daniela S. Cruzes and Lotfi ben Othmane. 
588 0 |a Print version record. 
590 |a eBooks on EBSCOhost  |b EBSCO eBook Subscription Academic Collection - Worldwide 
650 0 |a Computer security. 
650 0 |a Data protection. 
650 2 |a Computer Security 
650 6 |a Sécurité informatique. 
650 6 |a Protection de l'information (Informatique) 
650 0 7 |a COMPUTERS  |x Security  |x General.  |2 bisacsh 
650 0 7 |a COMPUTERS  |x Computer Engineering.  |2 bisacsh 
650 7 |a Computer security  |2 fast 
650 7 |a Data protection  |2 fast 
700 1 |a Othmane, Lotfi ben. 
700 1 |a Jaatun, Martin Gilje. 
700 1 |a Weippl, Edgar R. 
776 0 8 |i Print version:  |t Empirical research for software security  |z 9781498776417  |w (OCoLC)979567120 
830 0 |a Series in security, privacy, and trust. 
856 4 0 |u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742  |z Texto completo 
938 |a eLibro  |b ELBO  |n ELB141976 
938 |a EBSCOhost  |b EBSC  |n 1640742 
938 |a ProQuest MyiLibrary Digital eBook Collection  |b IDEB  |n cis37252451 
938 |a Taylor & Francis  |b TAFR  |n 9781315154855 
938 |a YBP Library Services  |b YANK  |n 15021395 
938 |a YBP Library Services  |b YANK  |n 15037920 
938 |a YBP Library Services  |b YANK  |n 15032550 
994 |a 92  |b IZTAP