000 | 03552nam a22006375i 4500 | ||
---|---|---|---|
001 | 978-3-540-45180-8 | ||
003 | DE-He213 | ||
005 | 20240423132558.0 | ||
007 | cr nn 008mamaa | ||
008 | 121227s2003 gw | s |||| 0|eng d | ||
020 |
_a9783540451808 _9978-3-540-45180-8 |
||
024 | 7 |
_a10.1007/b11930 _2doi |
|
050 | 4 | _aQA76.758 | |
072 | 7 |
_aUMZ _2bicssc |
|
072 | 7 |
_aCOM051230 _2bisacsh |
|
072 | 7 |
_aUMZ _2thema |
|
082 | 0 | 4 |
_a005.1 _223 |
100 | 1 |
_aSchumacher, Markus. _eauthor. _4aut _4http://id.loc.gov/vocabulary/relators/aut |
|
245 | 1 | 0 |
_aSecurity Engineering with Patterns _h[electronic resource] : _bOrigins, Theoretical Models, and New Applications / _cby Markus Schumacher. |
250 | _a1st ed. 2003. | ||
264 | 1 |
_aBerlin, Heidelberg : _bSpringer Berlin Heidelberg : _bImprint: Springer, _c2003. |
|
300 |
_aXIV, 210 p. _bonline resource. |
||
336 |
_atext _btxt _2rdacontent |
||
337 |
_acomputer _bc _2rdamedia |
||
338 |
_aonline resource _bcr _2rdacarrier |
||
347 |
_atext file _bPDF _2rda |
||
490 | 1 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v2754 |
|
505 | 0 | _a1. Introduction -- 2. Patterns in Software Development -- 3. Ontologies -- 4. The Human Factor -- 5. Classifying Security Improvement Artifacts -- 6. Toward a Security Core Ontology -- 7. Foundations of Security Patterns -- 8. A Theoretical Model for Security Patterns -- 9. New Applications of Security Patterns -- 10. Summary and Outlook -- A. Sources for Mining Security Patterns -- B. Example Security Patterns and Annotations -- C. Ontology Development -- D. F-Logic Primer -- E. Gaining Security Expertise. | |
520 | _aFor quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs. | ||
650 | 0 | _aSoftware engineering. | |
650 | 0 | _aSocial sciences. | |
650 | 0 | _aHumanities. | |
650 | 0 | _aComputer networks . | |
650 | 0 | _aOperating systems (Computers). | |
650 | 0 | _aComputers and civilization. | |
650 | 0 |
_aElectronic data processing _xManagement. |
|
650 | 1 | 4 | _aSoftware Engineering. |
650 | 2 | 4 | _aHumanities and Social Sciences. |
650 | 2 | 4 | _aComputer Communication Networks. |
650 | 2 | 4 | _aOperating Systems. |
650 | 2 | 4 | _aComputers and Society. |
650 | 2 | 4 | _aIT Operations. |
710 | 2 | _aSpringerLink (Online service) | |
773 | 0 | _tSpringer Nature eBook | |
776 | 0 | 8 |
_iPrinted edition: _z9783540407317 |
776 | 0 | 8 |
_iPrinted edition: _z9783662184288 |
830 | 0 |
_aLecture Notes in Computer Science, _x1611-3349 ; _v2754 |
|
856 | 4 | 0 | _uhttps://doi.org/10.1007/b11930 |
912 | _aZDB-2-SCS | ||
912 | _aZDB-2-SXCS | ||
912 | _aZDB-2-LNC | ||
912 | _aZDB-2-BAE | ||
942 | _cSPRINGER | ||
999 |
_c189334 _d189334 |