Suhel Ahmad Khan (India IGNTU), Kumar, Rajeev, MBBS, MS (General Surgery) (Administrative Staff Coll, Raees Ahmad Khan (Lucknow BBA Uni.)
Software Security
Concepts & Practices
Suhel Ahmad Khan (India IGNTU), Kumar, Rajeev, MBBS, MS (General Surgery) (Administrative Staff Coll, Raees Ahmad Khan (Lucknow BBA Uni.)
Software Security
Concepts & Practices
- Gebundenes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
Andere Kunden interessierten sich auch für
- Boyd L. SummersEffective Methods for Software Engineering110,99 €
- Delroy CheversA Software Development Approach for Driving Competitiveness in Small Firms132,99 €
- James Ransome (Senior Director, Product Security, McAfee - An IntelCore Software Security66,99 €
- Michael D. S. HarrisThe Business Value of It116,99 €
- Preston de GuiseThe Busy IT Manager's Guide to Data Recovery23,99 €
- Stephen J. Andriole (Villanova University, Pennsylvania, USA)IT's All about the People91,99 €
- Internet of Things and Secure Smart Environments160,99 €
-
-
-
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 306
- Erscheinungstermin: 13. Februar 2023
- Englisch
- Abmessung: 254mm x 178mm x 19mm
- Gewicht: 742g
- ISBN-13: 9781032356310
- ISBN-10: 1032356316
- Artikelnr.: 66268753
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 306
- Erscheinungstermin: 13. Februar 2023
- Englisch
- Abmessung: 254mm x 178mm x 19mm
- Gewicht: 742g
- ISBN-13: 9781032356310
- ISBN-10: 1032356316
- Artikelnr.: 66268753
Suhel Ahmad Khan is currently working as Assistant Professor in the Department of Computer Science, Indira Gandhi National Tribal University (A Central University), Amarkantak, Madhya Pradesh, India. He has 10 years of teaching and research experience. His areas of interest are Software Engineering, Software Security, Security Testing, Cyber Security, and Network Security. He has completed one major research project with PI funded by UGC, New Delhi, India. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, and Springer, etc. He is an active member of various professional bodies such as IAENG, ISOC-USA, IACSIT, and UACEE. Rajeev Kumar is currently working as Assistant Professor in the Center for Innovation and Technology, Administrative Staff College of India, Hyderabad. He is a young and energetic researcher and has worked on two major projects (with PI) funded by University Grants Commission, New Delhi, India and Council of Science & Technology, Uttar Pradesh (CST-UP), India. He has more than 5 years of research and teaching experience. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, Springer, etc. His research interests are in the different areas of Security Engineering and Computational Techniques. Raees Ahmad Khan (Member, IEEE, ACM, CSI, etc.) is currently working as Professor and Head of the Department in the Department of Information Technology, Dean of School for Information Science and Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Vidya Vihar, Raebareli Road, Lucknow, India. He has more than 20 years of teaching &and research experience. He has published more than 300 research publications with good impact factors in reputed international journals and conferences including IEEE, Springer, Elsevier, Inderscience, Hindawi, and IGI Global, etc. He has published a number of national and international books (authored and edited) (including Chinese language). His research interests are in the different areas of Security Engineering and Computational Techniques.
1. Software And Security Concepts. 2. Software Security Problems. 3.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
1. Software And Security Concepts. 2. Software Security Problems. 3.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.