Gespeichert in:
Weitere beteiligte Personen: | , |
---|---|
Format: | Elektronisch E-Book |
Sprache: | Englisch |
Veröffentlicht: |
Hershey, PA
IGI Global
[2019]
|
Schlagwörter: | |
Links: | https://doi.org/10.4018/978-1-5225-6313-6 https://doi.org/10.4018/978-1-5225-6313-6 https://doi.org/10.4018/978-1-5225-6313-6 https://doi.org/10.4018/978-1-5225-6313-6 https://doi.org/10.4018/978-1-5225-6313-6 https://doi.org/10.4018/978-1-5225-6313-6 https://doi.org/10.4018/978-1-5225-6313-6 |
Zusammenfassung: | "This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"... |
Beschreibung: | Includes bibliographical references |
Umfang: | 1 Online-Ressource |
ISBN: | 9781522563143 |
DOI: | 10.4018/978-1-5225-6313-6 |
Internformat
MARC
LEADER | 00000nam a2200000 c 4500 | ||
---|---|---|---|
001 | BV045439713 | ||
003 | DE-604 | ||
005 | 20211105 | ||
007 | cr|uuu---uuuuu | ||
008 | 190204s2019 xxu o|||| 00||| eng d | ||
020 | |a 9781522563143 |9 978-1-5225-6314-3 | ||
035 | |a (OCoLC)1085392049 | ||
035 | |a (DE-599)BVBBV045439713 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
044 | |a xxu |c US | ||
049 | |a DE-1050 |a DE-1049 |a DE-91 |a DE-898 |a DE-706 |a DE-83 | ||
050 | 0 | |a QA76.9.A25 | |
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Exploring security in software architecture and design |c Michael Felderer, Riccardo Scandariato |
264 | 1 | |a Hershey, PA |b IGI Global |c [2019] | |
300 | |a 1 Online-Ressource | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Includes bibliographical references | ||
520 | |a "This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"... | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Software architecture |x Security measures | |
650 | 4 | |a Software engineering |x Security measures | |
700 | 1 | |a Felderer, Michael |d 1978- |0 (DE-588)1144987245 |4 edt | |
700 | 1 | |a Scandariato, Riccardo |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe, h/c |z 978-1-5225-6313-6 |
856 | 4 | 0 | |u https://doi.org/10.4018/978-1-5225-6313-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltext |
912 | |a ZDB-98-IGB | ||
912 | |a ZDB-1-IGE | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-030825243 | |
966 | e | |u https://doi.org/10.4018/978-1-5225-6313-6 |l DE-1050 |p ZDB-98-IGB |q FHD01_IGB_Kauf |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-6313-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-6313-6 |l DE-1049 |p ZDB-1-IGE |q ZDB-1-IGE19 |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-6313-6 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-6313-6 |l DE-706 |p ZDB-98-IGB |x Verlag |3 Volltext | |
966 | e | |u https://doi.org/10.4018/978-1-5225-6313-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-OTHR_katkey | 6365723 |
---|---|
DE-BY-TUM_katkey | 2411496 |
_version_ | 1831257458890244097 |
any_adam_object | |
author2 | Felderer, Michael 1978- Scandariato, Riccardo |
author2_role | edt edt |
author2_variant | m f mf r s rs |
author_GND | (DE-588)1144987245 |
author_facet | Felderer, Michael 1978- Scandariato, Riccardo |
building | Verbundindex |
bvnumber | BV045439713 |
callnumber-first | Q - Science |
callnumber-label | QA76 |
callnumber-raw | QA76.9.A25 |
callnumber-search | QA76.9.A25 |
callnumber-sort | QA 276.9 A25 |
callnumber-subject | QA - Mathematics |
collection | ZDB-98-IGB ZDB-1-IGE |
ctrlnum | (OCoLC)1085392049 (DE-599)BVBBV045439713 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
doi_str_mv | 10.4018/978-1-5225-6313-6 |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02358nam a2200481 c 4500</leader><controlfield tag="001">BV045439713</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">20211105 </controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190204s2019 xxu o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522563143</subfield><subfield code="9">978-1-5225-6314-3</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1085392049</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV045439713</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="044" ind1=" " ind2=" "><subfield code="a">xxu</subfield><subfield code="c">US</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-1050</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-91</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="050" ind1=" " ind2="0"><subfield code="a">QA76.9.A25</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring security in software architecture and design</subfield><subfield code="c">Michael Felderer, Riccardo Scandariato</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, PA</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2019]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Includes bibliographical references</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"...</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software architecture</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering</subfield><subfield code="x">Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Felderer, Michael</subfield><subfield code="d">1978-</subfield><subfield code="0">(DE-588)1144987245</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scandariato, Riccardo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe, h/c</subfield><subfield code="z">978-1-5225-6313-6</subfield></datafield><datafield tag="856" ind1="4" ind2="0"><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-030825243</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">FHD01_IGB_Kauf</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="q">ZDB-1-IGE19</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">https://doi.org/10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV045439713 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:27:16Z |
institution | BVB |
isbn | 9781522563143 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-030825243 |
oclc_num | 1085392049 |
open_access_boolean | |
owner | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
owner_facet | DE-1050 DE-1049 DE-91 DE-BY-TUM DE-898 DE-BY-UBR DE-706 DE-83 |
physical | 1 Online-Ressource |
psigel | ZDB-98-IGB ZDB-1-IGE ZDB-98-IGB FHD01_IGB_Kauf ZDB-1-IGE ZDB-1-IGE19 ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2019 |
publishDateSearch | 2019 |
publishDateSort | 2019 |
publisher | IGI Global |
record_format | marc |
spellingShingle | Exploring security in software architecture and design Computer security Software architecture Security measures Software engineering Security measures |
title | Exploring security in software architecture and design |
title_auth | Exploring security in software architecture and design |
title_exact_search | Exploring security in software architecture and design |
title_full | Exploring security in software architecture and design Michael Felderer, Riccardo Scandariato |
title_fullStr | Exploring security in software architecture and design Michael Felderer, Riccardo Scandariato |
title_full_unstemmed | Exploring security in software architecture and design Michael Felderer, Riccardo Scandariato |
title_short | Exploring security in software architecture and design |
title_sort | exploring security in software architecture and design |
topic | Computer security Software architecture Security measures Software engineering Security measures |
topic_facet | Computer security Software architecture Security measures Software engineering Security measures |
url | https://doi.org/10.4018/978-1-5225-6313-6 |
work_keys_str_mv | AT felderermichael exploringsecurityinsoftwarearchitectureanddesign AT scandariatoriccardo exploringsecurityinsoftwarearchitectureanddesign |