Empirical research for software security foundations and experience
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these...
Saved in:
| Other Authors: | , , |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press, Taylor & Francis Group
2018
|
| Series: | CRC series in security, privacy and trust
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
MARC
| LEADER | 00000nam a2200000 i 4500 | ||
|---|---|---|---|
| 001 | 52836 | ||
| 003 | MY-KLNDU | ||
| 005 | 20241219014306.0 | ||
| 008 | 221104 2018 flua abi 001 0 eng d | ||
| 020 | |a 9781498776417 (hardback) | ||
| 020 | |a 1498776418 (hardback) | ||
| 039 | 9 | |a 202211041226 |b VLOAD |c 201910311143 |d johari |y 201904161242 |z helmey | |
| 040 | |a UPNM |b eng |c UPNM |e rda | ||
| 090 | |a QA 76.9.A25 |b E675 2018 | ||
| 245 | 0 | 0 | |a Empirical research for software security |b foundations and experience |c edited by Lotfi ben Othmane, Martin Gilje Jaatun, Edgar Weippl. |
| 264 | 1 | |a Boca Raton, FL |b CRC Press, Taylor & Francis Group |c 2018 | |
| 300 | |a xx, 302 pages |b illustrations |c 24 cm. | ||
| 336 | |a text |2 rdacontent | ||
| 337 | |a unmediated |2 rdamedia | ||
| 338 | |a volume |2 rdacarrier | ||
| 490 | 1 | |a CRC series in security, privacy and trust | |
| 504 | |a Includes bibliographical references and index. | ||
| 520 | |a Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices. | ||
| 592 | |a 37585 |b 08/08/2019 |c RM 555.42 |h Bookline | ||
| 650 | 0 | |a Computer security |x Research. | |
| 650 | 0 | |a Computer security |x Study and teaching. | |
| 700 | 1 | |a Ben Othmane, Lotfi, |e editor. | |
| 700 | 1 | |a Jaatun, Martin Gilje, |e editor. | |
| 700 | 1 | |a Weippl, Edgar R., |e editor. | |
| 830 | 0 | |a CRC series in security, privacy and trust | |
| 999 | |a vtls000063771 |c 52836 |d 52836 | ||


