Security-Aware Systems Applications and Software Development Methods

Security-Aware Systems Applications and Software Development Methods

Khaled M. Khan (Qatar University, Qatar)
Release Date: May, 2012|Copyright: © 2012 |Pages: 416|DOI: 10.4018/978-1-4666-1580-9
ISBN13: 9781466615809|ISBN10: 146661580X|EISBN13: 9781466615816
Hardcover:
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • 20% discount on 5+ titles*
E-Book:
(Multi-User License)
Available
$195.00
TOTAL SAVINGS: $195.00
Benefits
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
Hardcover +
E-Book:
(Multi-User License)
Available
$235.00
TOTAL SAVINGS: $235.00
Benefits
  • Free shipping on orders $395+
  • Printed-On-Demand (POD)
  • Usually ships one day from order
  • Multi-user license (no added fee)
  • Immediate access after purchase
  • No DRM
  • ePub with PDF download
  • 20% discount on 5+ titles*
OnDemand:
(Individual Chapters)
Available
$37.50
TOTAL SAVINGS: $37.50
Benefits
  • Purchase individual chapters from this book
  • Immediate PDF download after purchase or access through your personal library
  • 20% discount on 5+ titles*

Description

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design.

Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.

Topics Covered

The many academic areas covered in this publication include, but are not limited to:

  • Aspect-oriented software development
  • Curriculum Design
  • Dependable systems
  • Privacy Protection
  • Process of building secure software
  • Secure deployment of software applications
  • Security assurances, standards, and policies
  • Security audit and control
  • Security in software architecture and design
  • Security requirements engineering

Table of Contents and List of Contributors

Search this Book:
Reset

Author(s)/Editor(s) Biography

Khaled M. Khan is an Associate Professor in the department of Computer Science and Engineering and the Manager of KINDI Computing Research Lab at Qatar University. He was also the Graduate Program Coordinator for Master of Computing from 2009-2012. Prior to these, Khaled served Western Sydney University as Head of postgraduate programs in computing. His research interests include human factors in cyber security, secure software engineering, cloud computing, measuring security, trust in computer software, and software evolution. He has taught computing more than twenty five years at various universities in Asia, Europe, Africa, and Australia. Khaled received his BS and MS in computer science and informatics from the Norwegian University of Science and Technology. He received his PhD in computing from Monash University, Australia. He also holds a second bachelor's degree from the University of Dhaka (Bangladesh). He was the founding Editor-in-Chief of the International Journal of Secure Software Engineering (IJSSE) from 2009-2017. He is currently the Editor-in-Chief Emeritus of the IJSSE. Khaled has published more than 90 technical papers, and edited four books.