57,95 €
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
29 °P sammeln
57,95 €
57,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
29 °P sammeln
Als Download kaufen
57,95 €
inkl. MwSt.
Sofort per Download lieferbar
payback
29 °P sammeln
Jetzt verschenken
57,95 €
inkl. MwSt.
Sofort per Download lieferbar

Alle Infos zum eBook verschenken
payback
29 °P sammeln
  • Format: PDF

This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational. The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis…mehr

  • Geräte: PC
  • ohne Kopierschutz
  • eBook Hilfe
  • Größe: 12.79MB
Produktbeschreibung
This book provides a coherent overview of the most important modelling-related security techniques available today, and demonstrates how to combine them. Further, it describes an integrated set of systematic practices that can be used to achieve increased security for software from the outset, and combines practical ways of working with practical ways of distilling, managing, and making security knowledge operational.
The book addresses three main topics: (1) security requirements engineering, including security risk management, major activities, asset identification, security risk analysis and defining security requirements; (2) secure software system modelling, including modelling of context and protected assets, security risks, and decisions regarding security risk treatment using various modelling languages; and (3) secure system development, including effective approaches, pattern-driven development, and model-driven security.
The primar
y target audience of this book is graduate students studying cyber security, software engineering and system security engineering. The book will also benefit practitioners interested in learning about the need to consider the decisions behind secure software systems. Overall it offers the ideal basis for educating future generations of security experts.
"Dr. Matulevicius' book gives a coherent account of the most important modelling-related security techniques today, and is well suited for educating the next generations of security experts." - Prof. Andreas Lothe Opdahl, University of Bergen, Norway "Dr. Matulevicius introduces a fundamental set of knowledge for the advanced management of risk and security. Going from the conceptual aspects to practical tools, this book provides a broad coverage of the field." - Nicolas Mayer, Ph.D., Luxembourg Institute of Science and Technology

Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.

Autorenporträt
¿Raimundas Matulevicius is Associate Professor of Software Systems at the University of Tartu, Estonia. He has spent over 15 years teaching and conducting research in the fields of security requirements engineering, secure software design and information systems security in Norway, Belgium and Estonia. He is co-coordinator of the Cyber Security Masters curriculum delivered by Tallinn University of Technology and University of Tartu.