Developing and Evaluating Security-Aware Software Systems

Developing and Evaluating Security-Aware Software Systems
Author :
Publisher : IGI Global
Total Pages : 368
Release :
ISBN-10 : 9781466624832
ISBN-13 : 1466624833
Rating : 4/5 (32 Downloads)

Synopsis Developing and Evaluating Security-Aware Software Systems by : Khan, Khaled M.

"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--Provided by publisher.

Developing and Evaluating Security-aware Software Systems

Developing and Evaluating Security-aware Software Systems
Author :
Publisher :
Total Pages :
Release :
ISBN-10 : 162198933X
ISBN-13 : 9781621989332
Rating : 4/5 (3X Downloads)

Synopsis Developing and Evaluating Security-aware Software Systems by : Khaled M. Khan

"This book provides innovative ideas and methods on the development, operation, and maintenance of secure software systems and highlights the construction of a functional software system and a secure system simultaneously"--

Security-Aware Systems Applications and Software Development Methods

Security-Aware Systems Applications and Software Development Methods
Author :
Publisher : IGI Global
Total Pages : 416
Release :
ISBN-10 : 9781466615816
ISBN-13 : 1466615818
Rating : 4/5 (16 Downloads)

Synopsis Security-Aware Systems Applications and Software Development Methods by : Khan, Khaled M.

With the prevalence of cyber crime and cyber warfare, software developers must be vigilant in creating systems which are impervious to cyber attacks. Thus, security issues are an integral part of every phase of software development and an essential component of software design. Security-Aware Systems Applications and Software Development Methods facilitates the promotion and understanding of the technical as well as managerial issues related to secure software systems and their development practices. This book, targeted toward researchers, software engineers, and field experts, outlines cutting-edge industry solutions in software engineering and security research to help overcome contemporary challenges.

Securing Government Information and Data in Developing Countries

Securing Government Information and Data in Developing Countries
Author :
Publisher : IGI Global
Total Pages : 325
Release :
ISBN-10 : 9781522517047
ISBN-13 : 1522517049
Rating : 4/5 (47 Downloads)

Synopsis Securing Government Information and Data in Developing Countries by : Zoughbi, Saleem

The ongoing growth of information and communication technology is a high priority for any developing country. These advances help progress with different sectors of socio-economic development within these countries, and strengthens our global economy as a whole. Securing Government Information and Data in Developing Countries provides an informative examination of the latest strategies and methods for protecting government information and data within developing countries. Presenting dynamic topics such as security-critical systems, watermarking authentication, hybrid biometrics, and e-voting systems, this publication is an ideal reference source for practitioners, academicians, students, and researchers who are interested in the emerging trends of data security for governments.

Network Security Technologies: Design and Applications

Network Security Technologies: Design and Applications
Author :
Publisher : IGI Global
Total Pages : 348
Release :
ISBN-10 : 9781466647909
ISBN-13 : 1466647906
Rating : 4/5 (09 Downloads)

Synopsis Network Security Technologies: Design and Applications by : Amine, Abdelmalek

Recent advances in technologies have created a need for solving security problems in a systematic way. With this in mind, network security technologies have been produced in order to ensure the security of software and communication functionalities at basic, enhanced, and architectural levels. Network Security Technologies: Design and Applications presents theoretical frameworks and the latest research findings in network security technologies while analyzing malicious threats which can compromise network integrity. This book is an essential tool for researchers and professionals interested in improving their understanding of the strategic role of trust at different levels of information and knowledge society.

Security Management in Mobile Cloud Computing

Security Management in Mobile Cloud Computing
Author :
Publisher : IGI Global
Total Pages : 266
Release :
ISBN-10 : 9781522506034
ISBN-13 : 1522506039
Rating : 4/5 (34 Downloads)

Synopsis Security Management in Mobile Cloud Computing by : Munir, Kashif

Mobile Cloud Computing (MCC) has experienced explosive growth and is expected to continue to rise in popularity as new services and applications become available. As with any new technology, security issues continue to be a concern and developing effective methods to protect sensitive information and data on the cloud is imperative. Security Management in Mobile Cloud Computing explores the difficulties and challenges of securing user data and information on mobile cloud platforms. Investigating a variety of protocols and architectures that can be used to design, create, and develop security mechanisms, this publication is an essential resource for IT specialists, researchers, and graduate-level students interested in mobile cloud computing concepts and security.

Analyzing Security, Trust, and Crime in the Digital World

Analyzing Security, Trust, and Crime in the Digital World
Author :
Publisher : IGI Global
Total Pages : 299
Release :
ISBN-10 : 9781466648579
ISBN-13 : 1466648570
Rating : 4/5 (79 Downloads)

Synopsis Analyzing Security, Trust, and Crime in the Digital World by : Nemati, Hamid R.

In the digital era, information is the most valuable resource, and protecting one’s assets is a constant struggle for both individuals and organizations. Analyzing Security, Trust, and Crime in the Digital World explores techniques and technologies used to secure data and prevent intrusion in virtual environments. Within these pages, computer scientists, programmers, engineers, and practitioners will find meaningful research on intrusion detection and authentication techniques in order to further defend their own systems and protect the information therein.

HCI Challenges and Privacy Preservation in Big Data Security

HCI Challenges and Privacy Preservation in Big Data Security
Author :
Publisher : IGI Global
Total Pages : 293
Release :
ISBN-10 : 9781522528647
ISBN-13 : 1522528644
Rating : 4/5 (47 Downloads)

Synopsis HCI Challenges and Privacy Preservation in Big Data Security by : Lopez, Daphne

Privacy protection within large databases can be a challenge. By examining the current problems and challenges this domain is facing, more efficient strategies can be established to safeguard personal information against invasive pressures. HCI Challenges and Privacy Preservation in Big Data Security is an informative scholarly publication that discusses how human-computer interaction impacts privacy and security in almost all sectors of modern life. Featuring relevant topics such as large scale security data, threat detection, big data encryption, and identity management, this reference source is ideal for academicians, researchers, advanced-level students, and engineers that are interested in staying current on the advancements and drawbacks of human-computer interaction within the world of big data.

Design, Development, and Use of Secure Electronic Voting Systems

Design, Development, and Use of Secure Electronic Voting Systems
Author :
Publisher : IGI Global
Total Pages : 290
Release :
ISBN-10 : 9781466658219
ISBN-13 : 1466658215
Rating : 4/5 (19 Downloads)

Synopsis Design, Development, and Use of Secure Electronic Voting Systems by : Zissis, Dimitrios

In modern electoral processes, Information and Communication Technologies play a crucial role, whether used in voter registration, ballot casting, or processing of results. Securing these systems is a necessary step in ensuring the fairness of the democratic process. Design, Development, and Use of Secure Electronic Voting Systems analyzes current research on the integration of modern technologies with traditional democratic systems, providing a framework for designing and deploying electronic voting systems in any context or society. Stakeholders, researchers, architects, designers, and scholars interested in the use of electronic systems in government processes will use this book to gain a broader understanding of some of the latest advances in this emerging field.

Computers at Risk

Computers at Risk
Author :
Publisher : National Academies Press
Total Pages : 320
Release :
ISBN-10 : 9780309043885
ISBN-13 : 0309043883
Rating : 4/5 (85 Downloads)

Synopsis Computers at Risk by : National Research Council

Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.