International Journal of Secure Software Engineering, Issue 1

International Journal of Secure Software Engineering, Issue 1

Author: Khaled M. Khan

Publisher: IGI Publishing

Published: 2010

Total Pages: 90

ISBN-13: 9781613502150

DOWNLOAD EBOOK

The International Journal of Secure Software Engineering (IJSSE) publishes original research on the security concerns that construe during the software development practice. IJSSE promotes the idea of developing security-aware software systems from the ground up. This journal examines the software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. IJSSE includes all aspects of software security in the development, deployment, and management processes of software systems.


Engineering Secure Software and Systems

Engineering Secure Software and Systems

Author: Gilles Barthe

Publisher: Springer Science & Business Media

Published: 2012-01-30

Total Pages: 161

ISBN-13: 3642281656

DOWNLOAD EBOOK

This book constitutes the refereed proceedings of the 4th International Symposium on Engineering Secure Software and Systems, ESSoS 2012, held in Eindhoven, The Netherlands, in February 2012. The 7 revised full papers presented together with 7 idea papers were carefully reviewed and selected from 53 submissions. The full papers present new research results in the field of engineering secure software and systems, whereas the idea papers give crisp expositions of interesting, novel ideas in the early stages of development.


Security-Aware Systems Applications and Software Development Methods

Security-Aware Systems Applications and Software Development Methods

Author: Khan, Khaled M.

Publisher: IGI Global

Published: 2012-05-31

Total Pages: 416

ISBN-13: 1466615818

DOWNLOAD EBOOK

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.


Pattern and Security Requirements

Pattern and Security Requirements

Author: Kristian Beckers

Publisher: Springer

Published: 2015-04-15

Total Pages: 489

ISBN-13: 3319166646

DOWNLOAD EBOOK

Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns. Understanding Pattern and Security Requirements engineering methods is important for software engineers, security analysts and other professionals that are tasked with establishing a security standard, as well as researchers who aim to investigate the problems with establishing security standards. The examples and explanations in this book are designed to be understandable by all these readers.


Empirical Research for Software Security

Empirical Research for Software Security

Author: Lotfi ben Othmane

Publisher: CRC Press

Published: 2017-11-28

Total Pages: 216

ISBN-13: 1351650882

DOWNLOAD EBOOK

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.


Design, Development, and Use of Secure Electronic Voting Systems

Design, Development, and Use of Secure Electronic Voting Systems

Author: Zissis, Dimitrios

Publisher: IGI Global

Published: 2014-03-31

Total Pages: 290

ISBN-13: 1466658215

DOWNLOAD EBOOK

In modern electoral processes, Information and Communication Technologies play a crucial role, whether used in voter registration, ballot casting, or processing of results. Securing these systems is a necessary step in ensuring the fairness of the democratic process. Design, Development, and Use of Secure Electronic Voting Systems analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society. Stakeholders, researchers, architects, designers, and scholars interested in the use of electronic systems in government processes will use this book to gain a broader understanding of some of the latest advances in this emerging field.


Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications

Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2017-12-01

Total Pages: 2124

ISBN-13: 1522539247

DOWNLOAD EBOOK

Professionals in the interdisciplinary field of computer science focus on the design, operation, and maintenance of computational systems and software. Methodologies and tools of engineering are utilized alongside computer applications to develop efficient and precise information databases. Computer Systems and Software Engineering: Concepts, Methodologies, Tools, and Applications is a comprehensive reference source for the latest scholarly material on trends, techniques, and uses of various technology applications and examines the benefits and challenges of these computational developments. Highlighting a range of pertinent topics such as utility computing, computer security, and information systems applications, this multi-volume book is ideally designed for academicians, researchers, students, web designers, software developers, and practitioners interested in computer systems and software engineering.


Neutrosophic Sets and Systems, Vol. VIII

Neutrosophic Sets and Systems, Vol. VIII

Author: Florentin Smarandache, Mumtaz Ali

Publisher: Infinite Study

Published: 2015-04-01

Total Pages: 70

ISBN-13: 1599733382

DOWNLOAD EBOOK

This volume is a collection of ten papers by contributors F. Smarandache, F. Yuhua, K. Mondal, S. Pramanik, S. Broumi, J. Ye, A. A. Salama,, N. Easa, S. A. Elhafez, M. M. Lotfy, L. Kong, Y. Wu, P. Biswas, B. C. Giri, A. Mukkerjee, and S. Sarkar, focusing on a new kind of algebraic structures called (T, I, F)- Neutrosophic Structures; Expanding Uncertainty Principle to Certainty-Uncertainty Principles with Neutrosophy and Quad-stage Methods; Rough Neutrosophic Multi-Attribute Decision-Making Based on Rough Accuracy Score Function; an Extended TOPSIS Method for Multiple Attribute Decision Making based on Interval Neutrosophic Uncertain Linguistic Variable; Review of Recommender Systems Algorithms Utilized in Social Networks based e-Learning Systems & Neutrosophic System; Fault Diagnosis Method of Gasoline Engines Using the Cosine Similarity Measure of Neutrosophic Numbers; Cosine Similarity Measure Based Multi-attribute Decision-making with Trapezoidal Fuzzy Neutrosophic Numbers; Thesis-Antithesis-Neutrothesis, and Neutrosynthesis; Negating Four Color Theorem with Neutrosophy and Quadstage Method; and A new method of measuring similarity between two neutrosophic soft sets and its application in pattern recognition problems.


Computer Engineering: Concepts, Methodologies, Tools and Applications

Computer Engineering: Concepts, Methodologies, Tools and Applications

Author: Management Association, Information Resources

Publisher: IGI Global

Published: 2011-12-31

Total Pages: 2079

ISBN-13: 1613504578

DOWNLOAD EBOOK

"This reference is a broad, multi-volume collection of the best recent works published under the umbrella of computer engineering, including perspectives on the fundamental aspects, tools and technologies, methods and design, applications, managerial impact, social/behavioral perspectives, critical issues, and emerging trends in the field"--Provided by publisher.