Pattern and Security Requirements

Engineering-Based Establishment of Security Standards



Bookstore > Books > Pattern and Security Requirements

Price$123.92 - $131.18
Rating
AuthorKristian Beckers
PublisherSpringer
Published2015
Pages474
LanguageEnglish
FormatPaper book / ebook (PDF)
ISBN-103319166638
ISBN-139783319166636
EBook Hardcover Paperback

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards.

Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns.




Similar Books


PHP Objects, Patterns, and Practice, 4th Edition

PHP Objects, Patterns, and Practice, 4th Edition

by Matt Zandstra

The book begins by covering PHP's object-oriented features. It introduces key topics including class declaration, inheritance, reflection and much more. These provide the fundamentals of the PHP's support for objects. It also introduces some principles of design.This edition introduces new object relevant features such as traits...

Price:  $13.47  |  Publisher:  Apress  |  Release:  2013

PHP 8 Objects, Patterns, and Practice

PHP 8 Objects, Patterns, and Practice

by Matt Zandstra

Learn how to develop elegant and rock-solid systems using PHP, aided by three key elements: object fundamentals, design principles, and best practices. The 6th edition of this popular book has been fully updated for PHP 8, including attributes, constructor property promotion, new argument and return pseudo-types, and more. It also covers ...

Price:  $41.52  |  Publisher:  Apress  |  Release:  2021

Android Security Internals

Android Security Internals

by Nikolay Elenkov

There are more than one billion Android devices in use today, each one a potential target. Unfortunately, many fundamental Android security features have been little more than a black box to all but the most elite security professionals - until now.In Android Security Internals, top Android security expert Nikolay Elenkov takes us under t...

Price:  $23.99  |  Publisher:  No Starch Press  |  Release:  2014

Django Design Patterns and Best Practices

Django Design Patterns and Best Practices

by Arun Ravindran

Learning how to write better Django code to build more maintainable websites either takes a lot of experience or familiarity with various design patterns. Filled with several idiomatic Django patterns, Django Design Patterns and Best Practices accelerates your journey into the world of web development.Discover a set of common design probl...

Price:  $39.99  |  Publisher:  Packt Publishing  |  Release:  2015

MongoDB and Python

MongoDB and Python

by Niall O'Higgins

Learn how to leverage MongoDB with your Python applications, using the hands-on recipes in this book. You get complete code samples for tasks such as making fast geo queries for location-based apps, efficiently indexing your user documents for social-graph lookups, and many other scenarios.This guide explains the basics of the document-or...

Price:  $6.88  |  Publisher:  O'Reilly Media  |  Release:  2011

Machine Learning and Security

Machine Learning and Security

by Clarence Chio, David Freeman

Can machine learning techniques solve our computer security problems and finally put an end to the cat-and-mouse game between attackers and defenders? Or is this hope merely hype? Now you can dive into the science and answer this question for yourself. With this practical guide, you'll explore ways to apply machine learning to securi...

Price:  $30.49  |  Publisher:  O'Reilly Media  |  Release:  2018

Infrastructure as Code, Patterns and Practices

Infrastructure as Code, Patterns and Practices

by Rosemary Wang

Infrastructure as Code, Patterns and Practices teaches you to automate infrastructure by applying changes in a codified manner. You'll learn how to create, test, and deploy infrastructure components in a way that's easy to scale and share across an entire organization. The book is full of flexible automation techniques that work...

Price:  $50.09  |  Publisher:  Manning  |  Release:  2022

Open Source Identity Management Patterns and Practices Using OpenAM 10.x

Open Source Identity Management Patterns and Practices Using OpenAM 10.x

by Waylon Kenning

OpenAM is a web-based open source application that provides authentication, authorization, entitlement and federation services. OpenAM provides core identity services to simplify the implementation of transparent single sign-on (SSO) as a security component in a network infrastructure. It also provides the foundation for integrating diver...

Price:  $14.99  |  Publisher:  Packt Publishing  |  Release:  2013