|
|
|
|
LEADER |
00000cam a2200000 i 4500 |
001 |
EBSCO_on1003994047 |
003 |
OCoLC |
005 |
20231017213018.0 |
006 |
m o d |
007 |
cr cn||||||||| |
008 |
171114s2018 flu ob 001 0 eng d |
040 |
|
|
|a CRCPR
|b eng
|e rda
|e pn
|c CRCPR
|d IDEBK
|d N$T
|d STF
|d N$T
|d YDX
|d OCLCA
|d OCLCF
|d MCW
|d CAUOI
|d OCLCQ
|d OCLCO
|d ERL
|d OCLCA
|d MERER
|d CEF
|d OCLCQ
|d UPM
|d U3W
|d BNG
|d TYFRS
|d LOA
|d OCLCQ
|d K6U
|d VT2
|d OCLCQ
|d OCLCO
|d OCLCQ
|d ELBRO
|d OCLCO
|d OCLCQ
|d SFB
|d OCLCQ
|d OCLCO
|
019 |
|
|
|a 993948992
|a 1031041166
|a 1079402392
|a 1135389353
|a 1192329700
|a 1193985831
|a 1228540254
|
020 |
|
|
|a 9781315154855
|q (electronic bk.)
|
020 |
|
|
|a 1315154854
|q (electronic bk.)
|
020 |
|
|
|a 9781498776424
|q (electronic bk.)
|
020 |
|
|
|a 1498776426
|q (electronic bk.)
|
020 |
|
|
|z 9781498776417
|
020 |
|
|
|z 1498776418
|
029 |
1 |
|
|a AU@
|b 000065169279
|
029 |
1 |
|
|a CHBIS
|b 011432013
|
029 |
1 |
|
|a CHVBK
|b 567510425
|
035 |
|
|
|a (OCoLC)1003994047
|z (OCoLC)993948992
|z (OCoLC)1031041166
|z (OCoLC)1079402392
|z (OCoLC)1135389353
|z (OCoLC)1192329700
|z (OCoLC)1193985831
|z (OCoLC)1228540254
|
050 |
|
4 |
|a QA76.9.A25
|
072 |
|
7 |
|a COM
|x 059000
|2 bisacsh
|
072 |
|
7 |
|a COM
|x 053000
|2 bisacsh
|
082 |
0 |
4 |
|a 005.8
|2 22
|
049 |
|
|
|a UAMI
|
245 |
0 |
0 |
|a Empirical research for software security :
|b foundations and experience /
|c edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl.
|
250 |
|
|
|a First edition.
|
264 |
|
1 |
|a Boca Raton, FL :
|b CRC Press,
|c [2018]
|
300 |
|
|
|a 1 online resource (xxviii, 340 pages) :
|b 43 black and white images, 57 tables, 29 halftones and 14 line drawings
|
336 |
|
|
|a text
|b txt
|2 rdacontent
|
337 |
|
|
|a computer
|b c
|2 rdamedia
|
338 |
|
|
|a online resource
|b cr
|2 rdacarrier
|
490 |
1 |
|
|a CRC series in security, privacy and trust
|
520 |
2 |
|
|a "Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices."--Provided by publisher
|
504 |
|
|
|a Includes bibliographical references and index.
|
505 |
0 |
0 |
|t Empirical research on security and privacy by design /
|r Koen Yskout, Kim Wuyts, Dimitri Van Landuyt, Riccardo Scandariato, and Wouter Joosen --
|t Guidelines for systematic mapping studies in security engineering /
|r Michael Felderer and Jeffrey C. Carver --
|t Introduction to data analytics for software security /
|r Lotfi ben Othmane, Achim D. Brucker, Stanislav Dashevskyi, and Peter Tsalovski --
|t Generating software security knowledge through empirical methods /
|r René Noël, Santiago Matalonga, Gilberto Pedraza, Hernán Astudillo, and Eduardo B. Fernandez --
|t Visual analytics : foundations and experiences in malware analysis /
|r Markus Wagner, Dominik Sacha, Alexander Rind, Fabian Rischer, Robert Luh, Sebastian Schrittwieser, Daniel A. Keim, and Wolfgang Aigner --
|t Analysis of metrics for classification accuracy in intrusion detection /
|r Natalia Stakhanova and Alvaro A. Cardenas --
|t Building security in maturity model as a research tool /
|r Martin Gilje Jaatun --
|t Agile test automation for web applications : a security perspective /
|r Sandra Domenique Ringmann and Hanno Langweg --
|t Benchmark for empirical evaluation of web application anomaly detectors /
|r Robert Bronte, Hossain Shahriar, and Hisham Haddad --
|t Threats to validity in empirical software security research /
|r Daniela S. Cruzes and Lotfi ben Othmane.
|
588 |
0 |
|
|a Print version record.
|
590 |
|
|
|a eBooks on EBSCOhost
|b EBSCO eBook Subscription Academic Collection - Worldwide
|
650 |
|
0 |
|a Computer security.
|
650 |
|
0 |
|a Data protection.
|
650 |
|
2 |
|a Computer Security
|
650 |
|
6 |
|a Sécurité informatique.
|
650 |
|
6 |
|a Protection de l'information (Informatique)
|
650 |
0 |
7 |
|a COMPUTERS
|x Security
|x General.
|2 bisacsh
|
650 |
0 |
7 |
|a COMPUTERS
|x Computer Engineering.
|2 bisacsh
|
650 |
|
7 |
|a Computer security
|2 fast
|
650 |
|
7 |
|a Data protection
|2 fast
|
700 |
1 |
|
|a Othmane, Lotfi ben.
|
700 |
1 |
|
|a Jaatun, Martin Gilje.
|
700 |
1 |
|
|a Weippl, Edgar R.
|
776 |
0 |
8 |
|i Print version:
|t Empirical research for software security
|z 9781498776417
|w (OCoLC)979567120
|
830 |
|
0 |
|a Series in security, privacy, and trust.
|
856 |
4 |
0 |
|u https://ebsco.uam.elogim.com/login.aspx?direct=true&scope=site&db=nlebk&AN=1640742
|z Texto completo
|
938 |
|
|
|a eLibro
|b ELBO
|n ELB141976
|
938 |
|
|
|a EBSCOhost
|b EBSC
|n 1640742
|
938 |
|
|
|a ProQuest MyiLibrary Digital eBook Collection
|b IDEB
|n cis37252451
|
938 |
|
|
|a Taylor & Francis
|b TAFR
|n 9781315154855
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15021395
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15037920
|
938 |
|
|
|a YBP Library Services
|b YANK
|n 15032550
|
994 |
|
|
|a 92
|b IZTAP
|