- Broschiertes Buch
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
Andere Kunden interessierten sich auch für
- Software Networking52,99 €
- Thomas NicholasThe Tactical Software Engineer: Getting to Level I12,99 €
- Sam HintonSkip College, Start Programming: The Complete How-To Guide to Teaching Yourself Software Development27,99 €
- Gordon MorrisonThe Temporal Engineering(TM) of Software34,99 €
- Bob EricksonThe Geodesic Manifesto: Essentials of Software Development for the Post-Agile World32,99 €
- Oliver GoldmanEffective Software Architecture54,99 €
- Bin LinOpinion Mining for Software Development44,99 €
-
-
-
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Hinweis: Dieser Artikel kann nur an eine deutsche Lieferadresse ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 306
- Erscheinungstermin: 30. Januar 2025
- Englisch
- Abmessung: 254mm x 178mm
- Gewicht: 453g
- ISBN-13: 9781032361598
- ISBN-10: 103236159X
- Artikelnr.: 72541855
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
- Verlag: Taylor & Francis Ltd
- Seitenzahl: 306
- Erscheinungstermin: 30. Januar 2025
- Englisch
- Abmessung: 254mm x 178mm
- Gewicht: 453g
- ISBN-13: 9781032361598
- ISBN-10: 103236159X
- Artikelnr.: 72541855
- Herstellerkennzeichnung
- Libri GmbH
- Europaallee 1
- 36244 Bad Hersfeld
- 06621 890
Suhel Ahmad Khan is currently working as Assistant Professor in the Department of Computer Science, Indira Gandhi National Tribal University (A Central University), Amarkantak, Madhya Pradesh, India. He has 10 years of teaching and research experience. His areas of interest are Software Engineering, Software Security, Security Testing, Cyber Security, and Network Security. He has completed one major research project with PI funded by UGC, New Delhi, India. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, and Springer, etc. He is an active member of various professional bodies such as IAENG, ISOC-USA, IACSIT, and UACEE. Rajeev Kumar is currently working as Assistant Professor in the Center for Innovation and Technology, Administrative Staff College of India, Hyderabad. He is a young and energetic researcher and has worked on two major projects (with PI) funded by University Grants Commission, New Delhi, India and Council of Science & Technology, Uttar Pradesh (CST-UP), India. He has more than 5 years of research and teaching experience. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, Springer, etc. His research interests are in the different areas of Security Engineering and Computational Techniques. Raees Ahmad Khan (Member, IEEE, ACM, CSI, etc.) is currently working as Professor and Head of the Department in the Department of Information Technology, Dean of School for Information Science and Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Vidya Vihar, Raebareli Road, Lucknow, India. He has more than 20 years of teaching &and research experience. He has published more than 300 research publications with good impact factors in reputed international journals and conferences including IEEE, Springer, Elsevier, Inderscience, Hindawi, and IGI Global, etc. He has published a number of national and international books (authored and edited) (including Chinese language). His research interests are in the different areas of Security Engineering and Computational Techniques.
1. Software And Security Concepts. 2. Software Security Problems. 3.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
1. Software And Security Concepts. 2. Software Security Problems. 3.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.