000 03552nam a22006375i 4500
001 978-3-540-45180-8
003 DE-He213
005 20240423132558.0
007 cr nn 008mamaa
008 121227s2003 gw | s |||| 0|eng d
020 _a9783540451808
_9978-3-540-45180-8
024 7 _a10.1007/b11930
_2doi
050 4 _aQA76.758
072 7 _aUMZ
_2bicssc
072 7 _aCOM051230
_2bisacsh
072 7 _aUMZ
_2thema
082 0 4 _a005.1
_223
100 1 _aSchumacher, Markus.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
245 1 0 _aSecurity Engineering with Patterns
_h[electronic resource] :
_bOrigins, Theoretical Models, and New Applications /
_cby Markus Schumacher.
250 _a1st ed. 2003.
264 1 _aBerlin, Heidelberg :
_bSpringer Berlin Heidelberg :
_bImprint: Springer,
_c2003.
300 _aXIV, 210 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2754
505 0 _a1. Introduction -- 2. Patterns in Software Development -- 3. Ontologies -- 4. The Human Factor -- 5. Classifying Security Improvement Artifacts -- 6. Toward a Security Core Ontology -- 7. Foundations of Security Patterns -- 8. A Theoretical Model for Security Patterns -- 9. New Applications of Security Patterns -- 10. Summary and Outlook -- A. Sources for Mining Security Patterns -- B. Example Security Patterns and Annotations -- C. Ontology Development -- D. F-Logic Primer -- E. Gaining Security Expertise.
520 _aFor quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement. This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.
650 0 _aSoftware engineering.
650 0 _aSocial sciences.
650 0 _aHumanities.
650 0 _aComputer networks .
650 0 _aOperating systems (Computers).
650 0 _aComputers and civilization.
650 0 _aElectronic data processing
_xManagement.
650 1 4 _aSoftware Engineering.
650 2 4 _aHumanities and Social Sciences.
650 2 4 _aComputer Communication Networks.
650 2 4 _aOperating Systems.
650 2 4 _aComputers and Society.
650 2 4 _aIT Operations.
710 2 _aSpringerLink (Online service)
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783540407317
776 0 8 _iPrinted edition:
_z9783662184288
830 0 _aLecture Notes in Computer Science,
_x1611-3349 ;
_v2754
856 4 0 _uhttps://doi.org/10.1007/b11930
912 _aZDB-2-SCS
912 _aZDB-2-SXCS
912 _aZDB-2-LNC
912 _aZDB-2-BAE
942 _cSPRINGER
999 _c189334
_d189334