Pattern and Security Requirements
Engineering-Based Establishment of Security Standards
Price | $123.92 - $131.18
|
Rating | |
Author | Kristian Beckers |
Publisher | Springer |
Published | 2015 |
Pages | 474 |
Language | English |
Format | Paper book / ebook (PDF) |
ISBN-10 | 3319166638 |
ISBN-13 | 9783319166636 |
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards.
Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns.
- Kristian Beckers
Similar Books
PHP Objects, Patterns, and Practice, 4th Edition
by Matt Zandstra
The book begins by covering PHP's object-oriented features. It introduces key topics including class declaration, inheritance, reflection and much more. These provide the fundamentals of the PHP's support for objects. It also introduces some principles of design.This edition introduces new object relevant features such as traits...
Price: $13.47 | Publisher: Apress | Release: 2013
PHP 8 Objects, Patterns, and Practice
by Matt Zandstra
Learn how to develop elegant and rock-solid systems using PHP, aided by three key elements: object fundamentals, design principles, and best practices. The 6th edition of this popular book has been fully updated for PHP 8, including attributes, constructor property promotion, new argument and return pseudo-types, and more. It also covers ...
Price: $41.52 | Publisher: Apress | Release: 2021
by Nikolay Elenkov
There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals - until now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under t...
Price: $23.99 | Publisher: No Starch Press | Release: 2014
Django Design Patterns and Best Practices
by Arun Ravindran
Learning how to write better Django code to build more maintainable websites either takes a lot of experience or familiarity with various design patterns. Filled with several idiomatic Django patterns, Django Design Patterns and Best Practices accelerates your journey into the world of web development.Discover a set of common design probl...
Price: $39.99 | Publisher: Packt Publishing | Release: 2015
by Niall O'Higgins
Learn how to leverage MongoDB with your Python applications, using the hands-on recipes in this book. You get complete code samples for tasks such as making fast geo queries for location-based apps, efficiently indexing your user documents for social-graph lookups, and many other scenarios.This guide explains the basics of the document-or...
Price: $6.88 | Publisher: O'Reilly Media | Release: 2011
by Clarence Chio, David Freeman
Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to securi...
Price: $30.49 | Publisher: O'Reilly Media | Release: 2018
Infrastructure as Code, Patterns and Practices
by Rosemary Wang
Infrastructure as Code, Patterns and Practices teaches you to automate infrastructure by applying changes in a codified manner. You'll learn how to create, test, and deploy infrastructure components in a way that's easy to scale and share across an entire organization. The book is full of flexible automation techniques that work...
Price: $50.09 | Publisher: Manning | Release: 2022
Open Source Identity Management Patterns and Practices Using OpenAM 10.x
by Waylon Kenning
OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diver...
Price: $14.99 | Publisher: Packt Publishing | Release: 2013