Security Engineering with Patterns: Origins, Theoretical Models, and New Applications by Markus SchumacherSecurity Engineering with Patterns: Origins, Theoretical Models, and New Applications by Markus Schumacher

Security Engineering with Patterns: Origins, Theoretical Models, and New Applications

byMarkus Schumacher

Paperback | August 14, 2003

Pricing and Purchase Info

$117.50

Earn 588 plum® points

Prices and offers may vary in store

Quantity:

In stock online

Ships free on orders over $25

Not available in stores

about

For quite some time, in systems and software design, security only came as a second thought or even as a nice-to-have add-on. However, since the breakthrough of the Internet as a virtual backbone for electronic commerce and similar applications, security is now recognized as a fundamental requirement.

This book presents a systematic security improvement approach based on the pattern paradigm. The author first clarifies the key concepts of security patterns, defines their semantics and syntax, demonstrates how they can be used, and then compares his model with other security approaches. Based on the author's model and best practice in security patterns, security novices are now in a position to understand how security experts solve problems and can basically act like them by using the patterns available as building blocks for their designs.

Title:Security Engineering with Patterns: Origins, Theoretical Models, and New ApplicationsFormat:PaperbackDimensions:210 pagesPublished:August 14, 2003Publisher:Springer-Verlag/Sci-Tech/TradeLanguage:English

The following ISBNs are associated with this title:

ISBN - 10:3540407316

ISBN - 13:9783540407317

Look for similar items by category:

Reviews

Table of Contents

1. Introduction.- 2. Patterns in Software Development.- 3. Ontologies.- 4. The Human Factor.- 5. Classifying Security Improvement Artifacts.- 6. Toward a Security Core Ontology.- 7. Foundations of Security Patterns.- 8. A Theoretical Model for Security Patterns.- 9. New Applications of Security Patterns.- 10. Summary and Outlook.- A. Sources for Mining Security Patterns.- B. Example Security Patterns and Annotations.- C. Ontology Development.- D. F-Logic Primer.- E. Gaining Security Expertise.