Контакты/Проезд  Доставка и Оплата Помощь/Возврат
История
  +7(495) 980-12-10
  пн-пт: 10-18 сб,вс: 11-18
  shop@logobook.ru
   
    Поиск книг                    Поиск по списку ISBN Расширенный поиск    
Найти
  Зарубежные издательства Российские издательства  
Авторы | Каталог книг | Издательства | Новинки | Учебная литература | Акции | Хиты | |
 

Core Software Security: Security at the Source, Ransome James, Misra Anmol


Варианты приобретения
Цена: 7195.00р.
Кол-во:
Наличие: Поставка под заказ.  Есть в наличии на складе поставщика.
Склад Америка: Есть  
При оформлении заказа до: 2025-07-28
Ориентировочная дата поставки: Август-начало Сентября
При условии наличия книги у поставщика.

Добавить в корзину
в Мои желания

Автор: Ransome James, Misra Anmol
Название:  Core Software Security: Security at the Source
ISBN: 9781032027418
Издательство: Taylor&Francis
Классификация:

ISBN-10: 103202741X
Обложка/Формат: Paperback
Страницы: 414
Вес: 0.58 кг.
Дата издания: 30.06.2021
Язык: English
Иллюстрации: 16 tables, black and white; 53 illustrations, black and white
Размер: 23.39 x 15.60 x 2.16 cm
Читательская аудитория: Tertiary education (us: college)
Подзаголовок: Security at the source
Рейтинг:
Поставляется из: Европейский союз
Описание:

... an engaging book that will empower readers in both large and small software development and engineering organizations to build security into their products. ... Readers are armed with firm solutions for the fight against cyber threats.
-Dr. Dena Haritos Tsamitis. Carnegie Mellon University

... a must read for security specialists, software developers and software engineers. ... should be part of every security professionals library.
-Dr. Larry Ponemon, Ponemon Institute

... the definitive how-to guide for software security professionals. Dr. Ransome, Anmol Misra, and Brook Schoenfield deftly outline the procedures and policies needed to integrate real security into the software development process. ...A must-have for anyone on the front lines of the Cyber War ...
-Cedric Leighton, Colonel, USAF (Ret.), Cedric Leighton Associates

Dr. Ransome, Anmol Misra, and Brook Schoenfield give you a magic formula in this book - the methodology and process to build security into the entire software development life cycle so that the software is secured at the source!
-Eric S. Yuan, Zoom Video Communications

There is much publicity regarding network security, but the real cyber Achilles heel is insecure software. Millions of software vulnerabilities create a cyber house of cards, in which we conduct our digital lives. In response, security people build ever more elaborate cyber fortresses to protect this vulnerable software. Despite their efforts, cyber fortifications consistently fail to protect our digital treasures. Why? The security industry has failed to engage fully with the creative, innovative people who write software.

Core Software Security expounds developer-centric software security, a holistic process to engage creativity for security. As long as software is developed by humans, it requires the human element to fix it. Developer-centric security is not only feasible but also cost effective and operationally relevant. The methodology builds security into software development, which lies at the heart of our cyber infrastructure. Whatever development method is employed, software must be secured at the source.

Book Highlights:

  • Supplies a practitioners view of the SDL
  • Considers Agile as a security enabler
  • Covers the privacy elements in an SDL
  • Outlines a holistic business-savvy SDL framework that includes people, process, and technology
  • Highlights the key success factors, deliverables, and metrics for each phase of the SDL
  • Examines cost efficiencies, optimized performance, and organizational structure of a developer-centric software security program and PSIRT
  • Includes a chapter by noted security architect Brook Schoenfield who shares his insights and experiences in applying the books SDL framework

View the authors website at http: //www.androidinsecurity.com/




Integrating a usable security protocol into user authentication services design process

Автор: Braz, Christina Seffah, Ahmed Naqvi, Bilal
Название: Integrating a usable security protocol into user authentication services design process
ISBN: 1138577685 ISBN-13(EAN): 9781138577688
Издательство: Taylor&Francis
Рейтинг:
Цена: 16078.00 р.
Наличие на складе: Поставка под заказ.

Описание: This book is about creating usable products. The techniques, taken from the worlds of human-computer interaction, marketing, and many of the social sciences, help you know who your users are, and to make security a natural outcome of the requirements and design phase of the authentication method development life cycle.

Case Studies in Intelligent Computing

Название: Case Studies in Intelligent Computing
ISBN: 1138034126 ISBN-13(EAN): 9781138034129
Издательство: Taylor&Francis
Рейтинг:
Цена: 8420.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Although the field of intelligent systems has grown rapidly in recent years, there has been a need for a book that supplies a timely and accessible understanding of this important technology. Filling this need, Case Studies in Intelligent Computing: Achievements and Trends provides an up-to-date introduction to intelligent systems.

This edited book captures the state of the art in intelligent computing research through case studies that examine recent developments, developmental tools, programming, and approaches related to artificial intelligence (AI). The case studies illustrate successful machine learning and AI-based applications across various industries, including:

  • A non-invasive and instant disease detection technique based upon machine vision through the image scanning of the eyes of subjects with conjunctivitis and jaundice
  • Semantic orientation-based approaches for sentiment analysis
  • An efficient and autonomous method for distinguishing application protocols through the use of a dynamic protocol classification system
  • Nonwavelet and wavelet image denoising methods using fuzzy logic
  • Using remote sensing inputs based on swarm intelligence for strategic decision making in modern warfare
  • Rainfall-runoff modeling using a wavelet-based artificial neural network (WANN) model

Illustrating the challenges currently facing practitioners, the book presents powerful solutions recently proposed by leading researchers. The examination of the various case studies will help you develop the practical understanding required to participate in the advancement of intelligent computing applications.

The book will help budding researchers understand how and where intelligent computing can be applied. It will also help more established researchers update their skills and fine-tune their approach to intelligent computing.

Insider`s Guide to Cyber Security Architecture

Автор: Schoenfield
Название: Insider`s Guide to Cyber Security Architecture
ISBN: 1498741991 ISBN-13(EAN): 9781498741996
Издательство: Taylor&Francis
Рейтинг:
Цена: 9492.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

Any organization with valuable data has been or will be attacked, probably successfully, at some point and with some damage. And, don't all digitally connected organizations have at least some data that can be considered "valuable"?

Cyber security is a big, messy, multivariate, multidimensional arena. A reasonable "defense-in-depth" requires many technologies; smart, highly skilled people; and deep and broad analysis, all of which must come together into some sort of functioning whole, which is often termed a security architecture. Secrets of a Cyber Security Architect is about security architecture in practice. Expert security architects have dozens of tricks of their trade in their kips. In this book, author Brook S. E. Schoenfield shares his tips and tricks, as well as myriad tried and true bits of wisdom that his colleagues have shared with him.

Creating and implementing a cyber security architecture can be hard, complex, and certainly frustrating work. This book is written to ease this pain and show how to express security requirements in ways that make the requirements more palatable and, thus, get them accomplished. It also explains how to surmount individual, team, and organizational resistance. The book covers:

  • What security architecture is and the areas of expertise a security architect needs in practice
  • The relationship between attack methods and the art of building cyber defenses
  • Why to use attacks and how to derive a set of mitigations and defenses
  • Approaches, tricks, and manipulations proven successful for practicing security architecture
  • Starting, maturing, and running effective security architecture programs
  • Secrets of the trade for the practicing security architecture
  • Tricks to surmount typical problems

Filled with practical insight, Secrets of a Cyber Security Architect is the desk reference every security architect needs to thwart the constant threats and dangers confronting every digitally connected organization.

The science of biometrics :

Автор: Das, Ravindra,
Название: The science of biometrics :
ISBN: 1498761240 ISBN-13(EAN): 9781498761246
Издательство: Taylor&Francis
Рейтинг:
Цена: 8573.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The Science of Biometrics covers technical aspects of iris and facial recognition, focusing primarily on mathematical and statistical algorithms that run the verification and identification processes in these modalities.

Internet of Things and Advanced Application in Healthcare

Автор: Reis Catarina I., Maximiano Marisa Da Silva
Название: Internet of Things and Advanced Application in Healthcare
ISBN: 1522518207 ISBN-13(EAN): 9781522518204
Издательство: Mare Nostrum (Eurospan)
Рейтинг:
Цена: 30631.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The ubiquitous nature of the Internet of Things allows for enhanced connectivity between people in modern society. When applied to various industries, these current networking capabilities create opportunities for new applications.Internet of Things and Advanced Application in Healthcare is a critical reference source for emerging research on the implementation of the latest networking and technological trends within the healthcare industry. Featuring in-depth coverage across the broad scope of the Internet of Things in specialized settings, such as context-aware computing, reliability, and healthcare support systems, this publication is an ideal resource for professionals, researchers, upper-level students, practitioners, and technology developers seeking innovative material on the Internet of Things and its distinct applications.Topics Covered:Assistive TechnologiesContext-Aware Computing SystemsHealth Risk ManagementHealthcare Support SystemsReliability ConcernsSmart HealthcareWearable Sensors

Flexible network architectures security issues and principles

Автор: Rudra, Bhawana
Название: Flexible network architectures security issues and principles
ISBN: 1138505439 ISBN-13(EAN): 9781138505438
Издательство: Taylor&Francis
Рейтинг:
Цена: 11176.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание: The future of Internet security does not lie in doing more of the same. It requires not only a new architecture, but the means of securing that architecture. This book examines the new security architectures from organizations such as FIArch, GENI, and IETF and how they will contribute to a more secure Internet.

String Analysis for Software Verification and Security

Автор: Tevfik Bultan; Fang Yu; Muath Alkhalaf; Abdulbaki
Название: String Analysis for Software Verification and Security
ISBN: 3319686682 ISBN-13(EAN): 9783319686684
Издательство: Springer
Рейтинг:
Цена: 11878.00 р.
Наличие на складе: Есть у поставщика Поставка под заказ.

Описание:

This book discusses automated string-analysis techniques, focusing particularly on automata-based static string analysis. It covers the following topics: automata-bases string analysis, computing pre and post-conditions of basic string operations using automata, symbolic representation of automata, forward and backward string analysis using symbolic automata representation, constraint-based string analysis, string constraint solvers, relational string analysis, vulnerability detection using string analysis, string abstractions, differential string analysis, and automated sanitization synthesis using string analysis.

String manipulation is a crucial part of modern software systems; for example, it is used extensively in input validation and sanitization and in dynamic code and query generation. The goal of string-analysis techniques and this book is to determine the set of values that string expressions can take during program execution. String analysis can be used to solve many problems in modern software systems that relate to string manipulation, such as: (1) Identifying security vulnerabilities by checking if a security sensitive function can receive an input string that contains an exploit; (2) Identifying possible behaviors of a program by identifying possible values for dynamically generated code; (3) Identifying html generation errors by computing the html code generated by web applications; (4) Identifying the set of queries that are sent to back-end database by analyzing the code that generates the SQL queries; (5) Patching input validation and sanitization functions by automatically synthesizing repairs illustrated in this book.

Like many other program-analysis problems, it is not possible to solve the string analysis problem precisely (i.e., it is not possible to precisely determine the set of string values that can reach a program point). However, one can compute over- or under-approximations of possible string values. If the approximations are precise enough, they can enable developers to demonstrate existence or absence of bugs in string manipulating code. String analysis has been an active research area in the last decade, resulting in a wide variety of string-analysis techniques.

This book will primarily target researchers and professionals working in computer security, software verification, formal methods, software engineering and program analysis. Advanced level students or instructors teaching or studying courses in computer security, software verification or program analysis will find this book useful as a secondary text.


ООО "Логосфера " Тел:+7(495) 980-12-10 www.logobook.ru
   В Контакте     В Контакте Мед  Мобильная версия