|
|
Showing 1 - 2 of
2 matches in All Departments
As real-time and integrated systems become increasingly
sophisticated, issues related to development life cycles,
non-recurring engineering costs, and poor synergy between
development teams will arise. The Handbook of Research on Embedded
Systems Design provides insights from the computer science
community on integrated systems research projects taking place in
the European region. This premier references work takes a look at
the diverse range of design principles covered by these projects,
from specification at high abstraction levels using standards such
as UML and related profiles to intermediate design phases. This
work will be invaluable to designers of embedded software,
academicians, students, practitioners, professionals, and
researchers working in the computer science industry.
This book provides an overview of software security analysis in a
DevOps cycle including requirements formalisation, verification and
continuous monitoring. It presents an overview of the latest
techniques and tools that help engineers and developers verify the
security requirements of large-scale industrial systems and
explains novel methods that enable a faster feedback loop for
verifying security-related activities, which rely on techniques
such as automated testing, model checking, static analysis, runtime
monitoring, and formal methods. The book consists of three parts,
each covering a different aspect of security engineering in the
DevOps context. The first part, "Security Requirements", explains
how to specify and analyse security issues in a formal way. The
second part, "Prevention at Development Time", offers a practical
and industrial perspective on how to design, develop and verify
secure applications. The third part, "Protection at Operations",
eventually introduces tools for continuous monitoring of security
events and incidents. Overall, it covers several advanced topics
related to security verification, such as optimizing security
verification activities, automatically creating verifiable
specifications from security requirements and vulnerabilities, and
using these security specifications to verify security properties
against design specifications and generate artifacts such as tests
or monitors that can be used later in the DevOps process. The book
aims at computer engineers in general and does not require specific
knowledge. In particular, it is intended for software architects,
developers, testers, security professionals, and tool providers,
who want to define, build, test, and verify secure applications,
Web services, and industrial systems.
|
You may like...
Loot
Nadine Gordimer
Paperback
(2)
R367
R340
Discovery Miles 3 400
|