Exploring Security in Software Architecture and Design

Exploring Security in Software Architecture and Design

Noted as an IGI Global Core Reference Title in Security & Forensics for 2019.

Michael Felderer (University of Innsbruck, Austria) and Riccardo Scandariato (Chalmers University of Technology, Sweden & University of Gothenburg, Sweden)
Release Date: January, 2019|Copyright: © 2019 |Pages: 349
DOI: 10.4018/978-1-5225-6313-6
ISBN13: 9781522563136|ISBN10: 152256313X|EISBN13: 9781522563143|ISBN13 Softcover: 9781522586135
Hardcover:
Available
$215.00
TOTAL SAVINGS: $215.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
E-Book:
(Multi-User License)
Available
$193.50
List Price: $215.00
10% Discount:-$21.50
TOTAL SAVINGS: $21.50
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Hardcover +
E-Book:
(Multi-User License)
Available
$260.00
TOTAL SAVINGS: $260.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
Softcover:
Available
$165.00
TOTAL SAVINGS: $165.00
Benefits
  • Printed-On-Demand (POD)
  • Usually ships one day from order
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
Description & Coverage
Description:

Cyber-attacks continue to rise as more individuals rely on storing personal information on networks. Even though these networks are continuously checked and secured, cybercriminals find new strategies to break through these protections. Thus, advanced security systems, rather than simple security patches, need to be designed and developed.

Exploring Security in Software Architecture and Design is an essential reference source that discusses the development of security-aware software systems that are built into every phase of the software architecture. Featuring research on topics such as migration techniques, service-based software, and building security, this book is ideally designed for computer and software engineers, ICT specialists, researchers, academicians, and field experts.

Coverage:

The many academic areas covered in this publication include, but are not limited to:

  • Building Security
  • Dependable systems
  • Engineering Artifacts
  • Global Systems
  • Migration Techniques
  • Programming security
  • Security Education
  • Security Risk Analysis
  • Service-Based Software
  • Software Architecture
Table of Contents
Search this Book:
Reset
Peer Review Process
The peer review process is the driving force behind all IGI Global books and journals. All IGI Global reviewers maintain the highest ethical standards and each manuscript undergoes a rigorous double-blind peer review process, which is backed by our full membership to the Committee on Publication Ethics (COPE). The full publishing process and peer review are conducted within the IGI Global eEditorial Discovery® online submission system and on average takes 30 days. Learn More
Ethics & Malpractice
IGI Global affirms that ethical publication practices are critical to the successful development of knowledge. Therefore, it is the policy of IGI Global to maintain high ethical standards in all publications. These standards pertain to all books, journals, chapters, and articles accepted for publication. This is in accordance with standard scientific principles and IGI Global’s position as a source of scientific knowledge. Learn More
Archiving
All of IGI Global's content is archived via the CLOCKSS and LOCKSS initiative. Additionally, all IGI Global published content is available in IGI Global's InfoSci® platform.