125,95 €
125,95 €
inkl. MwSt.
Sofort per Download lieferbar
63 °P sammeln
125,95 €
Als Download kaufen
125,95 €
inkl. MwSt.
Sofort per Download lieferbar
63 °P sammeln
Jetzt verschenken
Alle Infos zum eBook verschenken
125,95 €
inkl. MwSt.
Sofort per Download lieferbar
Alle Infos zum eBook verschenken
63 °P sammeln
- Format: ePub
- Merkliste
- Auf die Merkliste
- Bewerten Bewerten
- Teilen
- Produkt teilen
- Produkterinnerung
- Produkterinnerung
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei
bücher.de, um das eBook-Abo tolino select nutzen zu können.
Hier können Sie sich einloggen
Hier können Sie sich einloggen
Sie sind bereits eingeloggt. Klicken Sie auf 2. tolino select Abo, um fortzufahren.
Bitte loggen Sie sich zunächst in Ihr Kundenkonto ein oder registrieren Sie sich bei bücher.de, um das eBook-Abo tolino select nutzen zu können.
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
- Geräte: eReader
- ohne Kopierschutz
- eBook Hilfe
- Größe: 20.54MB
Andere Kunden interessierten sich auch für
- Suhel Ahmad KhanSoftware Security (eBook, PDF)125,95 €
- Walter WilliamsCreating an Information Security Program from Scratch (eBook, ePUB)50,95 €
- Advanced Techniques and Applications of Cybersecurity and Forensics (eBook, ePUB)51,95 €
- Paul S WangBecoming a Computational Thinker (eBook, ePUB)40,95 €
- Tara KissoonOptimal Spending on Cybersecurity Measures (eBook, ePUB)49,95 €
- Tony ThomasIntelligent Mobile Malware Detection (eBook, ePUB)46,95 €
- Chong LiReinforcement Learning for Cyber-Physical Systems (eBook, ePUB)46,95 €
-
-
-
The textbook explores fundamental security theories that govern common software security technical issues. It teaches how to implement security solutions using popular software packages. It touches upon a wide range of cybersecurity domains, ranging from malware to biometrics and more.
Dieser Download kann aus rechtlichen Gründen nur mit Rechnungsadresse in A, B, BG, CY, CZ, D, DK, EW, E, FIN, F, GR, HR, H, IRL, I, LT, L, LR, M, NL, PL, P, R, S, SLO, SK ausgeliefert werden.
Produktdetails
- Produktdetails
- Verlag: Taylor & Francis
- Seitenzahl: 330
- Erscheinungstermin: 13. Februar 2023
- Englisch
- ISBN-13: 9781000832624
- Artikelnr.: 66994378
- Verlag: Taylor & Francis
- Seitenzahl: 330
- Erscheinungstermin: 13. Februar 2023
- Englisch
- ISBN-13: 9781000832624
- Artikelnr.: 66994378
- Herstellerkennzeichnung Die Herstellerinformationen sind derzeit nicht verfügbar.
Suhel Ahmad Khan is currently working as Assistant Professor in the Department of Computer Science, Indira Gandhi National Tribal University (A Central University), Amarkantak, Madhya Pradesh, India. He has 10 years of teaching and research experience. His areas of interest are Software Engineering, Software Security, Security Testing, Cyber Security, and Network Security. He has completed one major research project with PI funded by UGC, New Delhi, India. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, and Springer, etc. He is an active member of various professional bodies such as IAENG, ISOC-USA, IACSIT, and UACEE.
Rajeev Kumar is currently working as Assistant Professor in the Center for Innovation and Technology, Administrative Staff College of India, Hyderabad. He is a young and energetic researcher and has worked on two major projects (with PI) funded by University Grants Commission, New Delhi, India and Council of Science & Technology, Uttar Pradesh (CST-UP), India. He has more than 5 years of research and teaching experience. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, Springer, etc. His research interests are in the different areas of Security Engineering and Computational Techniques.
Raees Ahmad Khan (Member, IEEE, ACM, CSI, etc.) is currently working as Professor and Head of the Department in the Department of Information Technology, Dean of School for Information Science and Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Vidya Vihar, Raebareli Road, Lucknow, India. He has more than 20 years of teaching &and research experience. He has published more than 300 research publications with good impact factors in reputed international journals and conferences including IEEE, Springer, Elsevier, Inderscience, Hindawi, and IGI Global, etc. He has published a number of national and international books (authored and edited) (including Chinese language). His research interests are in the different areas of Security Engineering and Computational Techniques.
Rajeev Kumar is currently working as Assistant Professor in the Center for Innovation and Technology, Administrative Staff College of India, Hyderabad. He is a young and energetic researcher and has worked on two major projects (with PI) funded by University Grants Commission, New Delhi, India and Council of Science & Technology, Uttar Pradesh (CST-UP), India. He has more than 5 years of research and teaching experience. He has published numerous papers in international journals and conferences including IEEE, Elsevier, IGI Global, Springer, etc. His research interests are in the different areas of Security Engineering and Computational Techniques.
Raees Ahmad Khan (Member, IEEE, ACM, CSI, etc.) is currently working as Professor and Head of the Department in the Department of Information Technology, Dean of School for Information Science and Technology, Babasaheb Bhimrao Ambedkar University, (A Central University), Vidya Vihar, Raebareli Road, Lucknow, India. He has more than 20 years of teaching &and research experience. He has published more than 300 research publications with good impact factors in reputed international journals and conferences including IEEE, Springer, Elsevier, Inderscience, Hindawi, and IGI Global, etc. He has published a number of national and international books (authored and edited) (including Chinese language). His research interests are in the different areas of Security Engineering and Computational Techniques.
1. Software And Security Concepts. 2. Software Security Problems. 3.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
1. Software And Security Concepts. 2. Software Security Problems. 3.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.
Threats To Security . 4. Software Security Metrics. 5. Software Security
Estimation. 6. Secure Software Architecture. 7. Software Security
Assurance. 8. Secure Software Development Process. 9. Software Security
Testing. 10. Implementing Security Testing: A Case Study. 11. Implementing
Security: A Case Study. 12. Knowledge, Management And Governance For Higher
Security. 13. Research Trends In Software Security Estimation.