Engineering Secure Software and Systems: Second International Symposium, ESSoS 2010, Pisa, Italy, February 3-4, 2010, Proceedings: Lecture Notes in Computer Science, cartea 5965
Editat de Fabio MASSACCI, Dan Wallach, Nicola Zannoneen Limba Engleză Paperback – 27 ian 2010
Din seria Lecture Notes in Computer Science
- 20% Preț: 1061.55 lei
- 20% Preț: 341.95 lei
- 20% Preț: 369.12 lei
- 20% Preț: 645.28 lei
- 20% Preț: 591.51 lei
- 15% Preț: 580.46 lei
- Preț: 410.88 lei
- 20% Preț: 504.57 lei
- Preț: 381.21 lei
- 20% Preț: 340.32 lei
- 20% Preț: 1414.79 lei
- 20% Preț: 538.29 lei
- 20% Preț: 583.40 lei
- 20% Preț: 1075.26 lei
- 20% Preț: 238.01 lei
- 17% Preț: 360.19 lei
- 20% Preț: 438.69 lei
- 20% Preț: 1183.14 lei
- 20% Preț: 596.46 lei
- 15% Preț: 438.59 lei
- 20% Preț: 655.02 lei
- 20% Preț: 649.49 lei
- 20% Preț: 309.90 lei
- 20% Preț: 337.00 lei
- Preț: 449.57 lei
- 20% Preț: 310.26 lei
- 20% Preț: 1024.44 lei
- 20% Preț: 579.30 lei
- 20% Preț: 763.23 lei
- 20% Preț: 453.32 lei
- 20% Preț: 575.48 lei
- 20% Preț: 585.88 lei
- 20% Preț: 326.98 lei
- 20% Preț: 825.93 lei
- 17% Preț: 427.22 lei
- 20% Preț: 763.23 lei
- 20% Preț: 350.21 lei
- 20% Preț: 307.71 lei
- 20% Preț: 580.93 lei
- 20% Preț: 340.32 lei
- 20% Preț: 343.62 lei
- 20% Preț: 583.40 lei
- 20% Preț: 583.40 lei
- Preț: 389.48 lei
- 20% Preț: 353.50 lei
- 20% Preț: 607.39 lei
Preț: 331.25 lei
Preț vechi: 414.07 lei
-20% Nou
Puncte Express: 497
Preț estimativ în valută:
63.40€ • 65.94$ • 53.13£
63.40€ • 65.94$ • 53.13£
Carte tipărită la comandă
Livrare economică 13-27 martie
Preluare comenzi: 021 569.72.76
Specificații
ISBN-13: 9783642117466
ISBN-10: 3642117465
Pagini: 256
Ilustrații: X, 241 p.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.39 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
ISBN-10: 3642117465
Pagini: 256
Ilustrații: X, 241 p.
Dimensiuni: 155 x 235 x 13 mm
Greutate: 0.39 kg
Ediția:2010
Editura: Springer Berlin, Heidelberg
Colecția Springer
Seriile Lecture Notes in Computer Science, Security and Cryptology
Locul publicării:Berlin, Heidelberg, Germany
Public țintă
Professional/practitionerCuprins
Session 1. Attack Analysis and Prevention I.- BuBBle: A Javascript Engine Level Countermeasure against Heap-Spraying Attacks.- CsFire: Transparent Client-Side Mitigation of Malicious Cross-Domain Requests.- Idea: Opcode-Sequence-Based Malware Detection.- Session 2. Attack Analysis and Prevention II.- Experiences with PDG-Based IFC.- Idea: Java vs. PHP: Security Implications of Language Choice for Web Applications.- Idea: Towards Architecture-Centric Security Analysis of Software.- Session 3. Policy Verification and Enforcement I.- Formally-Based Black-Box Monitoring of Security Protocols.- Secure Code Generation for Web Applications.- Idea: Reusability of Threat Models – Two Approaches with an Experimental Evaluation.- Session 4. Policy Verification and Enforcement II.- Model-Driven Security Policy Deployment: Property Oriented Approach.- Category-Based Authorisation Models: Operational Semantics and Expressive Power.- Idea: Efficient Evaluation of Access Control Constraints.- Session 5. Secure System and Software Development I.- Formal Verification of Application-Specific Security Properties in a Model-Driven Approach.- Idea: Enforcing Consumer-Specified Security Properties for Modular Software.- Idea: Using System Level Testing for Revealing SQL Injection-Related Error Message Information Leaks.- Session 6. Secure System and Software Development II.- Automatic Generation of Smart, Security-Aware GUI Models.- Report: Modular Safeguards to Create Holistic Security Requirement Specifications for System of Systems.- Idea: A Feasibility Study in Model Based Prediction of Impact of Changes on System Quality.
Textul de pe ultima copertă
This book constitutes the refereed proceedings of the Second International Symposium on Engineering Secure Software and Systems, ESSoS 2010, held in Pisa, Italy, in February 2010.
The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.
The 9 revised full papers presented together with 8 ideas papers were carefully reviewed and selected from 58 submissions. The papers are organized in topical sections on attack analysis and prevention, policy verification and enforcement, and secure system and software development.
Caracteristici
Fast track conference proceeding Unique visibility State of the art research