Empirical Research for Software Security : (Record no. 133697)
[ view plain ]
000 -LEADER | |
---|---|
fixed length control field | 05108nam a22004813i 4500 |
001 - CONTROL NUMBER | |
control field | EBC5164090 |
003 - CONTROL NUMBER IDENTIFIER | |
control field | MiAaPQ |
005 - DATE AND TIME OF LATEST TRANSACTION | |
control field | 20240729131633.0 |
006 - FIXED-LENGTH DATA ELEMENTS--ADDITIONAL MATERIAL CHARACTERISTICS | |
fixed length control field | m o d | |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION | |
fixed length control field | cr cnu|||||||| |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION | |
fixed length control field | 240724s2017 xx o ||||0 eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
International Standard Book Number | 9781498776424 |
Qualifying information | (electronic bk.) |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER | |
Canceled/invalid ISBN | 9781498776417 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (MiAaPQ)EBC5164090 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (Au-PeEL)EBL5164090 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (CaPaEBR)ebr11479069 |
035 ## - SYSTEM CONTROL NUMBER | |
System control number | (OCoLC)1015867817 |
040 ## - CATALOGING SOURCE | |
Original cataloging agency | MiAaPQ |
Language of cataloging | eng |
Description conventions | rda |
-- | pn |
Transcribing agency | MiAaPQ |
Modifying agency | MiAaPQ |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER | |
Classification number | QA76.9.A25 E47 2018 |
100 1# - MAIN ENTRY--PERSONAL NAME | |
Personal name | ben Othmane, Lotfi. |
245 10 - TITLE STATEMENT | |
Title | Empirical Research for Software Security : |
Remainder of title | Foundations and Experience. |
250 ## - EDITION STATEMENT | |
Edition statement | 1st ed. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Place of production, publication, distribution, manufacture | Milton : |
Name of producer, publisher, distributor, manufacturer | Taylor & Francis Group, |
Date of production, publication, distribution, manufacture, or copyright notice | 2017. |
264 #4 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE | |
Date of production, publication, distribution, manufacture, or copyright notice | ©2017. |
300 ## - PHYSICAL DESCRIPTION | |
Extent | 1 online resource (323 pages) |
336 ## - CONTENT TYPE | |
Content type term | text |
Content type code | txt |
Source | rdacontent |
337 ## - MEDIA TYPE | |
Media type term | computer |
Media type code | c |
Source | rdamedia |
338 ## - CARRIER TYPE | |
Carrier type term | online resource |
Carrier type code | cr |
Source | rdacarrier |
490 1# - SERIES STATEMENT | |
Series statement | Series in Security, Privacy and Trust Series |
505 0# - FORMATTED CONTENTS NOTE | |
Formatted contents note | Cover -- Half Title -- Title Page -- Copyright Page -- Table of Contents -- Preface -- List of Figures -- List of Tables -- Contributors -- 1: Empirical Research on Security and Privacy by Design -- 1.1 Introduction -- 1.2 Empirical Research on Security and Privacy by Design -- 1.3 Scoping -- 1.4 Planning -- 1.5 Operation -- 1.6 Analysis and Interpretation -- 1.7 Presentation and Packaging -- 1.8 Conclusion -- 2: Guidelines for Systematic Mapping Studies in Security Engineering -- 2.1 Introduction -- 2.2 Background on Systematic Mapping Studies in Software Engineering -- 2.3 Overview of Available Mapping Studies in Security Engineering -- 2.4 Guidelines for Systematic Mapping Studies in Security Engineering -- 2.5 Summary -- 3: An Introduction to Data Analytics for Software Security -- 3.1 Introduction -- 3.2 Secure Software Development -- 3.3 Software Security Analytical Process -- 3.4 Learning Methods Used in Software Security -- 3.5 Evaluation of Model Performance -- 3.6 More Lessons Learned -- 3.7 Conclusion -- 3.8 Acknowledgment -- 4: Generating Software Security Knowledge Through Empirical Methods -- 4.1 Introduction and Motivation -- 4.2 Empirical Methods for Knowledge Generation -- 4.3 Example Application Domain: Secure Software Development Research Project -- 4.4 Experiments -- 4.5 Systematic Literature Mappings -- 4.6 Case Studies -- 4.7 Experimental Replications -- 4.8 Conclusions -- 4.9 Acknowledgment -- 5: Visual Analytics: Foundations and Experiences in Malware Analysis -- 5.1 Introduction -- 5.2 Background in Malware Analysis -- 5.3 Visual Analytics Foundations -- 5.4 The Knowledge Generation Process -- 5.5 Design and Evaluation for Visual Analytics Systems -- 5.6 Experience in Malware Analysis -- 5.7 Future Directions -- 5.8 Conclusions -- 6: Analysis of Metrics for Classification Accuracy in Intrusion Detection. |
505 8# - FORMATTED CONTENTS NOTE | |
Formatted contents note | 6.1 Introduction -- 6.2 Evaluation Metrics -- 6.3 Literature Review -- 6.4 What Hinders Adoption of Alternative Metrics -- 6.5 Guidelines for Introducing New Evaluation Metrics -- 6.6 Conclusions -- 6.7 Acknowledgement -- 7: The Building Security in Maturity Model as a Research Tool -- 7.1 Introduction -- 7.2 Background -- 7.3 Questionnaires in Software Security -- 7.4 A Case Study -- 7.5 Discussion -- 7.6 Conclusion -- 8: Agile Test Automation for Web Applications- A Security Perspective -- 8.1 Introduction -- 8.2 Methodology -- 8.3 Risk Assessment -- 8.4 Testing and Test Automation from the Security Perspective -- 8.5 Static Analysis Tools -- 8.6 Dynamic Analysis Tools and Frameworks -- 8.7 Evaluating Static/Dynamic Analysis Tools and Frameworks -- 8.8 Appraisal of the Tools -- 8.9 Conclusion -- 9: Benchmark for Empirical Evaluation of Web Application Anomaly Detectors -- 9.1 Introduction -- 9.2 Literature Review -- 9.3 Benchmark Characteristics for Application-Layer Attack Detection Approaches -- 9.4 An Example Environment for Generating Benchmark Data -- 9.5 Using the Benchmark Dataset to Evaluate an IDS -- 9.6 Conclusion -- 10: Threats to Validity in Empirical Software Security Research -- 10.1 Introduction -- 10.2 Defining Validity -- 10.3 Validity for Quantitative Research -- 10.4 Threats to Validity for Qualitative Research -- 10.5 Summary and Conclusions -- Index. |
588 ## - SOURCE OF DESCRIPTION NOTE | |
Source of description note | Description based on publisher supplied metadata and other sources. |
590 ## - LOCAL NOTE (RLIN) | |
Local note | Electronic reproduction. Ann Arbor, Michigan : ProQuest Ebook Central, 2024. Available via World Wide Web. Access may be limited to ProQuest Ebook Central affiliated libraries. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer security. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM | |
Topical term or geographic name entry element | Computer networks-Security measures. |
655 #4 - INDEX TERM--GENRE/FORM | |
Genre/form data or focus term | Electronic books. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Jaatun, Martin Gilje. |
700 1# - ADDED ENTRY--PERSONAL NAME | |
Personal name | Weippl, Edgar. |
776 08 - ADDITIONAL PHYSICAL FORM ENTRY | |
Relationship information | Print version: |
Main entry heading | ben Othmane, Lotfi |
Title | Empirical Research for Software Security |
Place, publisher, and date of publication | Milton : Taylor & Francis Group,c2017 |
International Standard Book Number | 9781498776417 |
797 2# - LOCAL ADDED ENTRY--CORPORATE NAME (RLIN) | |
Corporate name or jurisdiction name as entry element | ProQuest (Firm) |
830 #0 - SERIES ADDED ENTRY--UNIFORM TITLE | |
Uniform title | Series in Security, Privacy and Trust Series |
856 40 - ELECTRONIC LOCATION AND ACCESS | |
Uniform Resource Identifier | <a href="https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5164090">https://ebookcentral.proquest.com/lib/orpp/detail.action?docID=5164090</a> |
Public note | Click to View |
No items available.