Security Engineering with Patterns Origins, Theoretical Models, and New Applications /

For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requiremen...

Πλήρης περιγραφή

Λεπτομέρειες βιβλιογραφικής εγγραφής
Κύριος συγγραφέας: Schumacher, Markus (Συγγραφέας, http://id.loc.gov/vocabulary/relators/aut)
Συγγραφή απο Οργανισμό/Αρχή: SpringerLink (Online service)
Μορφή: Ηλεκτρονική πηγή Ηλ. βιβλίο
Γλώσσα:English
Έκδοση: Berlin, Heidelberg : Springer Berlin Heidelberg : Imprint: Springer, 2003.
Έκδοση:1st ed. 2003.
Σειρά:Lecture Notes in Computer Science, 2754
Θέματα:
Διαθέσιμο Online:Full Text via HEAL-Link
LEADER 03908nam a2200589 4500
001 978-3-540-45180-8
003 DE-He213
005 20191029042137.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 |a 9783540451808  |9 978-3-540-45180-8 
024 7 |a 10.1007/b11930  |2 doi 
040 |d GrThAP 
050 4 |a QA76.758 
072 7 |a UMZ  |2 bicssc 
072 7 |a COM051230  |2 bisacsh 
072 7 |a UMZ  |2 thema 
082 0 4 |a 005.1  |2 23 
100 1 |a Schumacher, Markus.  |e author.  |4 aut  |4 http://id.loc.gov/vocabulary/relators/aut 
245 1 0 |a Security Engineering with Patterns  |h [electronic resource] :  |b Origins, Theoretical Models, and New Applications /  |c by Markus Schumacher. 
250 |a 1st ed. 2003. 
264 1 |a Berlin, Heidelberg :  |b Springer Berlin Heidelberg :  |b Imprint: Springer,  |c 2003. 
300 |a XIV, 210 p.  |b online resource. 
336 |a text  |b txt  |2 rdacontent 
337 |a computer  |b c  |2 rdamedia 
338 |a online resource  |b cr  |2 rdacarrier 
347 |a text file  |b PDF  |2 rda 
490 1 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2754 
505 0 |a 1. Introduction -- 2. Patterns in Software Development -- 3. Ontologies -- 4. The Human Factor -- 5. Classifying Security Improvement Artifacts -- 6. Toward a Security Core Ontology -- 7. Foundations of Security Patterns -- 8. A Theoretical Model for Security Patterns -- 9. New Applications of Security Patterns -- 10. Summary and Outlook -- A. Sources for Mining Security Patterns -- B. Example Security Patterns and Annotations -- C. Ontology Development -- D. F-Logic Primer -- E. Gaining Security Expertise. 
520 |a For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs. 
650 0 |a Software engineering. 
650 0 |a Computer communication systems. 
650 0 |a Operating systems (Computers). 
650 0 |a Computers and civilization. 
650 0 |a Management information systems. 
650 0 |a Computer science. 
650 1 4 |a Software Engineering.  |0 http://scigraph.springernature.com/things/product-market-codes/I14029 
650 2 4 |a Science, Humanities and Social Sciences, multidisciplinary.  |0 http://scigraph.springernature.com/things/product-market-codes/A11007 
650 2 4 |a Computer Communication Networks.  |0 http://scigraph.springernature.com/things/product-market-codes/I13022 
650 2 4 |a Operating Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I14045 
650 2 4 |a Computers and Society.  |0 http://scigraph.springernature.com/things/product-market-codes/I24040 
650 2 4 |a Management of Computing and Information Systems.  |0 http://scigraph.springernature.com/things/product-market-codes/I24067 
710 2 |a SpringerLink (Online service) 
773 0 |t Springer eBooks 
776 0 8 |i Printed edition:  |z 9783662184288 
776 0 8 |i Printed edition:  |z 9783540407317 
830 0 |a Lecture Notes in Computer Science,  |x 0302-9743 ;  |v 2754 
856 4 0 |u https://doi.org/10.1007/b11930  |z Full Text via HEAL-Link 
912 |a ZDB-2-SCS 
912 |a ZDB-2-LNC 
912 |a ZDB-2-BAE 
950 |a Computer Science (Springer-11645)