Exploring security in software architecture and design:
"This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, de...
Gespeichert in:
Internformat
MARC
LEADER | 00000nam a2200000zc 4500 | ||
---|---|---|---|
001 | BV046096033 | ||
003 | DE-604 | ||
005 | 00000000000000.0 | ||
007 | cr|uuu---uuuuu | ||
008 | 190809s2018 xx o|||| 00||| eng d | ||
020 | |a 9781522563143 |9 978-1-5225-6314-3 | ||
024 | 7 | |a 10.4018/978-1-5225-6313-6 |2 doi | |
035 | |a (ZDB-1-IGE)00199087 | ||
035 | |a (OCoLC)1112134302 | ||
035 | |a (DE-599)BVBBV046096033 | ||
040 | |a DE-604 |b ger |e rda | ||
041 | 0 | |a eng | |
049 | |a DE-91 |a DE-573 |a DE-20 |a DE-1049 |a DE-898 |a DE-706 |a DE-1050 |a DE-83 | ||
082 | 0 | |a 005.8 |2 23 | |
245 | 1 | 0 | |a Exploring security in software architecture and design |c Michael Felderer and Riccardo Scandariato, editor |
264 | 1 | |a Hershey, Pennsylvania |b IGI Global |c [2018] | |
300 | |a 1 Online-Ressource (19 PDFs (349 pages)) | ||
336 | |b txt |2 rdacontent | ||
337 | |b c |2 rdamedia | ||
338 | |b cr |2 rdacarrier | ||
500 | |a Description based on title screen (IGI Global, viewed 01/24/2019) | ||
520 | |a "This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"-- | ||
650 | 4 | |a Computer security | |
650 | 4 | |a Software architecture / Security measures | |
650 | 4 | |a Software engineering / Security measures | |
700 | 1 | |a Felderer, Michael |4 edt | |
700 | 1 | |a Scandariato, Riccardo |4 edt | |
776 | 0 | 8 | |i Erscheint auch als |n Druck-Ausgabe |z 152256313X |z 9781522563136 |
856 | 4 | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |x Verlag |z URL des Erstveröffentlichers |3 Volltex | |
912 | |a ZDB-1-IGE | ||
912 | |a ZDB-98-IGB | ||
943 | 1 | |a oai:aleph.bib-bvb.de:BVB01-031476888 | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-91 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-573 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-20 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-1049 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-898 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-706 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-1050 |p ZDB-1-IGE |x Verlag |3 Volltext | |
966 | e | |u http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |l DE-83 |p ZDB-98-IGB |q TUB_EBS_IGB |x Verlag |3 Volltext |
Datensatz im Suchindex
DE-BY-TUM_katkey | 2424703 |
---|---|
_version_ | 1821932865926987776 |
any_adam_object | |
author2 | Felderer, Michael Scandariato, Riccardo |
author2_role | edt edt |
author2_variant | m f mf r s rs |
author_facet | Felderer, Michael Scandariato, Riccardo |
building | Verbundindex |
bvnumber | BV046096033 |
collection | ZDB-1-IGE ZDB-98-IGB |
ctrlnum | (ZDB-1-IGE)00199087 (OCoLC)1112134302 (DE-599)BVBBV046096033 |
dewey-full | 005.8 |
dewey-hundreds | 000 - Computer science, information, general works |
dewey-ones | 005 - Computer programming, programs, data, security |
dewey-raw | 005.8 |
dewey-search | 005.8 |
dewey-sort | 15.8 |
dewey-tens | 000 - Computer science, information, general works |
discipline | Informatik |
format | Electronic eBook |
fullrecord | <?xml version="1.0" encoding="UTF-8"?><collection xmlns="http://www.loc.gov/MARC21/slim"><record><leader>02999nam a2200505zc 4500</leader><controlfield tag="001">BV046096033</controlfield><controlfield tag="003">DE-604</controlfield><controlfield tag="005">00000000000000.0</controlfield><controlfield tag="007">cr|uuu---uuuuu</controlfield><controlfield tag="008">190809s2018 xx o|||| 00||| eng d</controlfield><datafield tag="020" ind1=" " ind2=" "><subfield code="a">9781522563143</subfield><subfield code="9">978-1-5225-6314-3</subfield></datafield><datafield tag="024" ind1="7" ind2=" "><subfield code="a">10.4018/978-1-5225-6313-6</subfield><subfield code="2">doi</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(ZDB-1-IGE)00199087</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(OCoLC)1112134302</subfield></datafield><datafield tag="035" ind1=" " ind2=" "><subfield code="a">(DE-599)BVBBV046096033</subfield></datafield><datafield tag="040" ind1=" " ind2=" "><subfield code="a">DE-604</subfield><subfield code="b">ger</subfield><subfield code="e">rda</subfield></datafield><datafield tag="041" ind1="0" ind2=" "><subfield code="a">eng</subfield></datafield><datafield tag="049" ind1=" " ind2=" "><subfield code="a">DE-91</subfield><subfield code="a">DE-573</subfield><subfield code="a">DE-20</subfield><subfield code="a">DE-1049</subfield><subfield code="a">DE-898</subfield><subfield code="a">DE-706</subfield><subfield code="a">DE-1050</subfield><subfield code="a">DE-83</subfield></datafield><datafield tag="082" ind1="0" ind2=" "><subfield code="a">005.8</subfield><subfield code="2">23</subfield></datafield><datafield tag="245" ind1="1" ind2="0"><subfield code="a">Exploring security in software architecture and design</subfield><subfield code="c">Michael Felderer and Riccardo Scandariato, editor</subfield></datafield><datafield tag="264" ind1=" " ind2="1"><subfield code="a">Hershey, Pennsylvania</subfield><subfield code="b">IGI Global</subfield><subfield code="c">[2018]</subfield></datafield><datafield tag="300" ind1=" " ind2=" "><subfield code="a">1 Online-Ressource (19 PDFs (349 pages))</subfield></datafield><datafield tag="336" ind1=" " ind2=" "><subfield code="b">txt</subfield><subfield code="2">rdacontent</subfield></datafield><datafield tag="337" ind1=" " ind2=" "><subfield code="b">c</subfield><subfield code="2">rdamedia</subfield></datafield><datafield tag="338" ind1=" " ind2=" "><subfield code="b">cr</subfield><subfield code="2">rdacarrier</subfield></datafield><datafield tag="500" ind1=" " ind2=" "><subfield code="a">Description based on title screen (IGI Global, viewed 01/24/2019)</subfield></datafield><datafield tag="520" ind1=" " ind2=" "><subfield code="a">"This book explores security in software architecture and design. It examines software security from a software engineering perspective and addresses technical, as well as managerial aspects of secure software engineering. It also includes all aspects of software security in the development, deployment, and management processes of software systems"--</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Computer security</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software architecture / Security measures</subfield></datafield><datafield tag="650" ind1=" " ind2="4"><subfield code="a">Software engineering / Security measures</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Felderer, Michael</subfield><subfield code="4">edt</subfield></datafield><datafield tag="700" ind1="1" ind2=" "><subfield code="a">Scandariato, Riccardo</subfield><subfield code="4">edt</subfield></datafield><datafield tag="776" ind1="0" ind2="8"><subfield code="i">Erscheint auch als</subfield><subfield code="n">Druck-Ausgabe</subfield><subfield code="z">152256313X</subfield><subfield code="z">9781522563136</subfield></datafield><datafield tag="856" ind1="4" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="x">Verlag</subfield><subfield code="z">URL des Erstveröffentlichers</subfield><subfield code="3">Volltex</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-1-IGE</subfield></datafield><datafield tag="912" ind1=" " ind2=" "><subfield code="a">ZDB-98-IGB</subfield></datafield><datafield tag="943" ind1="1" ind2=" "><subfield code="a">oai:aleph.bib-bvb.de:BVB01-031476888</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-91</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-573</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-20</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-1049</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-898</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-706</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-1050</subfield><subfield code="p">ZDB-1-IGE</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield><datafield tag="966" ind1="e" ind2=" "><subfield code="u">http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6</subfield><subfield code="l">DE-83</subfield><subfield code="p">ZDB-98-IGB</subfield><subfield code="q">TUB_EBS_IGB</subfield><subfield code="x">Verlag</subfield><subfield code="3">Volltext</subfield></datafield></record></collection> |
id | DE-604.BV046096033 |
illustrated | Not Illustrated |
indexdate | 2024-12-20T18:43:02Z |
institution | BVB |
isbn | 9781522563143 |
language | English |
oai_aleph_id | oai:aleph.bib-bvb.de:BVB01-031476888 |
oclc_num | 1112134302 |
open_access_boolean | |
owner | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
owner_facet | DE-91 DE-BY-TUM DE-573 DE-20 DE-1049 DE-898 DE-BY-UBR DE-706 DE-1050 DE-83 |
physical | 1 Online-Ressource (19 PDFs (349 pages)) |
psigel | ZDB-1-IGE ZDB-98-IGB ZDB-98-IGB TUB_EBS_IGB |
publishDate | 2018 |
publishDateSearch | 2018 |
publishDateSort | 2018 |
publisher | IGI Global |
record_format | marc |
spellingShingle | Exploring security in software architecture and design Computer security Software architecture / Security measures Software engineering / Security measures |
title | Exploring security in software architecture and design |
title_auth | Exploring security in software architecture and design |
title_exact_search | Exploring security in software architecture and design |
title_full | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor |
title_fullStr | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor |
title_full_unstemmed | Exploring security in software architecture and design Michael Felderer and Riccardo Scandariato, editor |
title_short | Exploring security in software architecture and design |
title_sort | exploring security in software architecture and design |
topic | Computer security Software architecture / Security measures Software engineering / Security measures |
topic_facet | Computer security Software architecture / Security measures Software engineering / Security measures |
url | http://services.igi-global.com/resolvedoi/resolve.aspx?doi=10.4018/978-1-5225-6313-6 |
work_keys_str_mv | AT felderermichael exploringsecurityinsoftwarearchitectureanddesign AT scandariatoriccardo exploringsecurityinsoftwarearchitectureanddesign |