Vendeur : WeBuyBooks, Rossendale, LANCS, Royaume-Uni
EUR 13,73
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierEtat : Good. Most items will be dispatched the same or the next working day. A copy that has been read but remains in clean condition. All of the pages are intact and the cover is intact and the spine may show signs of wear. The book may have minor markings which are not specifically mentioned.
Vendeur : Ria Christie Collections, Uxbridge, Royaume-Uni
EUR 93,30
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. In.
Edité par Springer Vieweg 2022-07, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : Chiron Media, Wallingford, Royaume-Uni
EUR 93,49
Autre deviseQuantité disponible : 10 disponible(s)
Ajouter au panierPF. Etat : New.
Edité par Springer Fachmedien Wiesbaden, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : AHA-BUCH GmbH, Einbeck, Allemagne
EUR 96,29
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Druck auf Anfrage Neuware - Printed after ordering - For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 94,96
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : New.
Edité par Springer Fachmedien Wiesbaden, Springer Fachmedien Wiesbaden Jul 2022, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : buchversandmimpf2000, Emtmannsberg, BAYE, Allemagne
EUR 96,29
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. Neuware -For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage.Springer Vieweg in Springer Science + Business Media, Abraham-Lincoln-Straße 46, 65189 Wiesbaden 512 pp. Englisch.
Vendeur : GreatBookPrices, Columbia, MD, Etats-Unis
EUR 110,84
Autre deviseQuantité disponible : 15 disponible(s)
Ajouter au panierEtat : As New. Unread book in perfect condition.
Vendeur : Books Puddle, New York, NY, Etats-Unis
EUR 131,99
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. 1st ed. 2022 edition NO-PA16APR2015-KAP.
Edité par Vieweg + Teubner Verlag, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : Revaluation Books, Exeter, Royaume-Uni
EUR 140,57
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierPaperback. Etat : Brand New. 512 pages. 8.27x5.83x1.22 inches. In Stock.
Vendeur : Lucky's Textbooks, Dallas, TX, Etats-Unis
EUR 93,78
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New.
Edité par Springer Fachmedien Wiesbaden, Weisbaden, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : Grand Eagle Retail, Mason, OH, Etats-Unis
Edition originale
EUR 97,27
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage. For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. Shipping may be from multiple locations in the US or from the UK, depending on stock availability.
Edité par Springer Fachmedien Wiesbaden, Weisbaden, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : AussieBookSeller, Truganina, VIC, Australie
Edition originale
EUR 179,09
Autre deviseQuantité disponible : 1 disponible(s)
Ajouter au panierPaperback. Etat : new. Paperback. For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage. For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. Shipping may be from our Sydney, NSW warehouse or from our UK or US warehouse, depending on stock availability.
Edité par Springer, Berlin|Springer Fachmedien Wiesbaden|Springer Vieweg, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : moluna, Greven, Allemagne
EUR 83,50
Autre deviseQuantité disponible : Plus de 20 disponibles
Ajouter au panierEtat : New. Dieser Artikel ist ein Print on Demand Artikel und wird nach Ihrer Bestellung fuer Sie gedruckt. For ensuring a software system s security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with.
Edité par Springer Fachmedien Wiesbaden Jul 2022, 2022
ISBN 10 : 3658376643 ISBN 13 : 9783658376642
Langue: anglais
Vendeur : BuchWeltWeit Ludwig Meier e.K., Bergisch Gladbach, Allemagne
EUR 96,29
Autre deviseQuantité disponible : 2 disponible(s)
Ajouter au panierTaschenbuch. Etat : Neu. This item is printed on demand - it takes 3-4 days longer - Neuware -For ensuring a software system's security, it is vital to keep up with changing security precautions, attacks, and mitigations. Although model-based development enables addressing security already at design-time, design models are often inconsistent with the implementation or among themselves. An additional burden are variants of software systems. To ensure security in this context, we present an approach based on continuous automated change propagation, allowing security experts to specify security requirements on the most suitable system representation. We automatically check all system representations against these requirements and provide security-preserving refactorings for preserving security compliance. For both, we show the application to variant-rich software systems. To support legacy systems, we allow to reverse-engineer variability-aware UML models and semi-automatically map existing design models to the implementation. Besides evaluations of the individual contributions, we demonstrate the approach in two open-source case studies, the iTrust electronics health records system and the Eclipse Secure Storage. 512 pp. Englisch.
Vendeur : Majestic Books, Hounslow, Royaume-Uni
EUR 136,69
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. Print on Demand.
Vendeur : Biblios, Frankfurt am main, HESSE, Allemagne
EUR 140,01
Autre deviseQuantité disponible : 4 disponible(s)
Ajouter au panierEtat : New. PRINT ON DEMAND.