0
Your cart

Your cart is empty

Browse All Departments
  • All Departments
Price
  • R1,000 - R2,500 (1)
  • R2,500 - R5,000 (4)
  • -
Status
Brand

Showing 1 - 5 of 5 matches in All Departments

Empirical Research for Software Security - Foundations and Experience (Paperback): Lotfi Ben Othmane, Martin Gilje Jaatun,... Empirical Research for Software Security - Foundations and Experience (Paperback)
Lotfi Ben Othmane, Martin Gilje Jaatun, Edgar Weippl
R1,399 Discovery Miles 13 990 Ships in 12 - 17 working days

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media - Cyber Science 2022;... Proceedings of the International Conference on Cybersecurity, Situational Awareness and Social Media - Cyber Science 2022; 20-21 June; Wales (Hardcover, 1st ed. 2023)
Cyril Onwubiko, Pierangelo Rosati, Aunshul Rege, Arnau Erola, Xavier Bellekens, …
R5,124 R4,677 Discovery Miles 46 770 Save R447 (9%) Ships in 9 - 15 working days

This book highlights advances in Cyber Security, Cyber Situational Awareness (CyberSA), Artificial Intelligence (AI) and Social Media. It brings together original discussions, ideas, concepts and outcomes from research and innovation from multidisciplinary experts. It offers topical, timely and emerging original innovations and research results in cyber situational awareness, security analytics, cyber physical systems, blockchain technologies, machine learning, social media and wearables, protection of online digital service, cyber incident response, containment, control, and countermeasures (CIRC3). The theme of Cyber Science 2022 is Ethical and Responsible use of AI. Includes original contributions advancing research in Artificial Intelligence, Machine Learning, Blockchain, Cyber Security, Social Media, Cyber Incident Response & Cyber Insurance. The Chapters "Municipal Cybersecurity - A Neglected Research Area? A Survey of Current Research, The Transnational Dimension of Cyber Security: The NIS Directive and its Jurisdictional Challenges, Refining the Mandatory Cybersecurity Incident Reporting under the NIS Directive 2.0: Event Types and Reporting Processes" are available open access under a Creative Commons Attribution 4.0 International License via link.springer.com.

Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback,... Cloud Computing - First International Conference, CloudCom 2009, Beijing, China, December 1-4, 2009, Proceedings (Paperback, 2009 ed.)
Martin Gilje Jaatun, Gansen Zhao, Chunming Rong
R2,915 Discovery Miles 29 150 Ships in 10 - 15 working days

This volume contains the proceedings of CloudCom 2009, the First Inter- tional Conference on Cloud Computing. The conference was held in Beijing, China, during December 1-4, 2009, and was the ?rst in a series initiated by the Cloud Computing Association (www.cloudcom.org). The Cloud Computing Association was founded in 2009 by Chunming Rong, Martin Gilje Jaatun, and Frode Eika Sandnes. This ?rst conference was organized by the Beijing Ji- tong University, Chinese Institute of Electronics, and Wuhan University, and co-organized by Huazhong University of Science and Technology, South China Normal University, and Sun Yat-sen University. Ever since the inception of the Internet, a "Cloud" has been used as a metaphor for a network-accessible infrastructure (e.g., data storage, computing hardware, or entire networks) which is hidden from users. To some, the concept of cloud computing may seem like a throwback to the days of big mainframe computers, but we believe that cloud computing makes data truly mobile, - lowing a user to access services anywhere, anytime, with any Internet browser. In cloud computing, IT-related capabilities are provided as services, accessible without requiring control of, or even knowledge of, the underlying technology. Cloud computing provides dynamic scalability of services and computing power, and although many mature technologies are used as components in cloud c- puting, there are still many unresolved and open problems.

Autonomic and Trusted Computing - 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008,  Proceedings... Autonomic and Trusted Computing - 5th International Conference, ATC 2008, Oslo, Norway, June 23-25, 2008, Proceedings (Paperback, 2008 ed.)
Chunming Rong, Martin Gilje Jaatun, Frode Eika Sandnes, Laurence Tianruo Yang
R2,903 Discovery Miles 29 030 Ships in 10 - 15 working days

ThisvolumecontainstheproceedingsofATC2008, the5thInternationalConf- ence on Autonomic and Trusted Computing: Bringing Safe, Self-x and Organic Computing Systems into Reality. The conference was held in Oslo, Norway, d- ing June 23-25, 2008. ATC 2008 is a successor of the First IFIP Workshop on Trusted and Au- nomic Ubiquitous and Embedded Systems (TAUES 2005, Japan), the Inter- tional Workshop on Trusted and Autonomic Computing Systems (TACS 2006, Austria), the Third International Conference on Autonomic and Trusted C- puting (ATC 2006, China), and the 4th International Conference on Autonomic and Trusted Computing (ATC 2007, Hong Kong). Computing systems including hardware, software, communication and n- worksaregrowingdramaticallyinbothscale andheterogeneity, becoming overly complex. Such complexity is getting even more critical with the ubiquitous p- meation of embedded devices and other pervasive systems. To cope with the growingandubiquitous complexity, Autonomic Computing(AC)focuses onse- manageable computing and communication systems that exhibit self-awareness, self-con?guration, self-optimization, self-healing, self-protection and other self-x operationsto the maximumextent possible without humaninterventionorgu- ance. Organic Computing (OC) additionally emphasizes natural-analogue c- cepts like self-organization and controlled emergence. Any autonomic or organic system must be trustworthy to avoid the risk of losingcontrolandto retaincon?dencethatthe systemwillnotfail.Trustand/or distrust relationships in the Internet and in pervasive infrastructures are key factorsinenablingdynamicinteractionandcooperationofvarioususers, systems and services. Trusted/Trustworthy Computing (TC) aims at making computing and communication systems as well as services available, predictable, traceable, controllable, assessable, sustainable, dependable, persistable, security/privacy protectable,

Empirical Research for Software Security - Foundations and Experience (Hardcover): Lotfi Ben Othmane, Martin Gilje Jaatun,... Empirical Research for Software Security - Foundations and Experience (Hardcover)
Lotfi Ben Othmane, Martin Gilje Jaatun, Edgar Weippl
R3,854 Discovery Miles 38 540 Ships in 12 - 17 working days

Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. Empirical methods, including data analytics, allow extracting knowledge and insights from the data that organizations collect from their processes and tools, and from the opinions of the experts who practice these processes and methods. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these methods can be used to hone a secure software development lifecycle based on empirical data and published best practices.

Free Delivery
Pinterest Twitter Facebook Google+
You may like...
Beyond Diplomacy - My Life Of Remarkable…
Riaan Eksteen Paperback R473 Discovery Miles 4 730
Huntlea Original Two Tone Pillow Bed…
R650 R565 Discovery Miles 5 650
Xbox One Replacement Case
 (8)
R53 Discovery Miles 530
Moto-Quip Rubber Mat (50 x 35cm)(Black)
R62 Discovery Miles 620
Peptine Pro Canine/Feline Hydrolysed…
R369 R259 Discovery Miles 2 590
GMC Window Seal Kit for Portable Air…
R550 R399 Discovery Miles 3 990
Mellerware Swiss - Plastic Floor Fan…
 (1)
R348 Discovery Miles 3 480
Bosch GBM 320 Professional Drill…
R779 R670 Discovery Miles 6 700
CritiCareŽ Sterile Gauze Swabs (75 x 75…
R3 Discovery Miles 30
Genuine Leather Wallet With Clip Closure…
R299 R160 Discovery Miles 1 600

 

Partners