MARC details
000 -LEADER |
fixed length control field |
04274nam a22004815i 4500 |
003 - CONTROL NUMBER IDENTIFIER |
control field |
DE-He213 |
005 - DATE AND TIME OF LATEST TRANSACTION |
control field |
20231104114219.0 |
007 - PHYSICAL DESCRIPTION FIXED FIELD--GENERAL INFORMATION |
fixed length control field |
cr nn 008mamaa |
008 - FIXED-LENGTH DATA ELEMENTS--GENERAL INFORMATION |
fixed length control field |
150415s2015 gw | s |||| 0|eng d |
020 ## - INTERNATIONAL STANDARD BOOK NUMBER |
International Standard Book Number |
9783319166643 |
Canceled/invalid ISBN |
978-3-319-16664-3 |
024 7# - OTHER STANDARD IDENTIFIER |
Standard number or code |
10.1007/978-3-319-16664-3 |
Source of number or code |
doi |
050 #4 - LIBRARY OF CONGRESS CALL NUMBER |
Classification number |
QA76.9.A25 |
072 #7 - SUBJECT CATEGORY CODE |
Subject category code |
UR |
Source |
bicssc |
|
Subject category code |
COM053000 |
Source |
bisacsh |
|
Subject category code |
UR |
Source |
thema |
|
Subject category code |
UTN |
Source |
thema005.8 |
-- |
23 |
041 ## - LANGUAGE CODE |
Language code of text/sound track or separate title |
İngilizce |
100 1# - MAIN ENTRY--PERSONAL NAME |
Personal name |
Beckers, Kristian. |
Relator term |
author. |
Relator code |
aut |
-- |
http://id.loc.gov/vocabulary/relators/aut |
245 10 - TITLE STATEMENT |
Title |
Pattern and Security Requirements : |
Remainder of title |
Engineering-Based Establishment of Security Standards / |
Statement of responsibility, etc. |
by Kristian Beckers. |
264 #1 - PRODUCTION, PUBLICATION, DISTRIBUTION, MANUFACTURE, AND COPYRIGHT NOTICE |
Place of production, publication, distribution, manufacture |
Cham : |
Name of producer, publisher, distributor, manufacturer |
Springer International Publishing : |
-- |
Imprint: Springer, |
Date of production, publication, distribution, manufacture, or copyright notice |
2015. |
300 ## - PHYSICAL DESCRIPTION |
Extent |
1 online resource |
336 ## - CONTENT TYPE |
Content type term |
text |
Content type code |
txt |
Source |
rdacontent |
337 ## - MEDIA TYPE |
Media type term |
computer |
Media type code |
c |
Source |
rdamedia |
338 ## - CARRIER TYPE |
Carrier type term |
online resource |
Carrier type code |
cr |
Source |
rdacarrier |
347 ## - DIGITAL FILE CHARACTERISTICS |
File type |
text file |
Encoding format |
PDF |
Source |
rda |
505 0# - FORMATTED CONTENTS NOTE |
Formatted contents note |
Foreword -- Preface -- Introduction -- Background -- The PEERESS Framework -- The CAST Method for Comparing Security Standards -- Relating ISO 27001 to the Conceptual Framework for Security Requirements Engineering Methods -- Supporting ISO 27001 compliant ISMS Establishment with Si* -- Supporting ISO 27001 Establishment with CORAS -- Supporting Common Criteria Security Analysis with Problem Frames -- Supporting ISO 26262 Hazard Analysis with Problem Frames -- A Catalog of Context-Patterns -- Initiating a Pattern Language for Context-Patterns -- Supporting the Establishment of a cloud-specific ISMS according to ISO 27001 using the Cloud System Analysis Pattern -- Validation and Extension of our Context-Pattern Approach -- Conclusion. |
520 ## - SUMMARY, ETC. |
Summary, etc. |
Security threats are a significant problem for information technology companies today. This book focuses on how to mitigate these threats by using security standards and provides ways to address associated problems faced by engineers caused by ambiguities in the standards. The security standards are analysed, fundamental concepts of the security standards presented, and the relations to the elementary concepts of security requirements engineering (SRE) methods explored. Using this knowledge, engineers can build customised methods that support the establishment of security standards. Standards such as Common Criteria or ISO 27001 are explored and several extensions are provided to well-known SRE methods such as Si*, CORAS, and UML4PF to support the establishment of these security standards. Through careful analysis of the activities demanded by the standards, for example the activities to establish an Information Security Management System (ISMS) in compliance with the ISO 27001 standard, methods are proposed which incorporate existing security requirement approaches and patterns. Understanding Pattern and Security Requirements engineering methods is important for software engineers, security analysts, and other professionals that are tasked with establishing a security standard, as well as researchers who aim to investigate the problems with establishing security standards. The examples and explanations in this book are designed to be understandable by all these readers. |
650 #0 - SUBJECT ADDED ENTRY--TOPICAL TERM |
Topical term or geographic name entry element |
Computer security. |
|
Topical term or geographic name entry element |
Information Systems. |
|
Topical term or geographic name entry element |
System safety. |
|
Topical term or geographic name entry element |
Artificial intelligence. |
|
Topical term or geographic name entry element |
Computer science. |
|
Topical term or geographic name entry element |
Systems and Data Security. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I28060 |
|
Topical term or geographic name entry element |
Management of Computing and Information Systems. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I24067 |
|
Topical term or geographic name entry element |
Quality Control, Reliability, Safety and Risk. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/T22032 |
|
Topical term or geographic name entry element |
Artificial Intelligence. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I21000 |
|
Topical term or geographic name entry element |
Models and Principles. |
Authority record control number or standard number |
http://scigraph.springernature.com/things/product-market-codes/I18016 |
710 2# - ADDED ENTRY--CORPORATE NAME |
Corporate name or jurisdiction name as entry element |
SpringerLink (Online service) |
856 40 - ELECTRONIC LOCATION AND ACCESS |
Uniform Resource Identifier |
<a href="https://doi.org/10.1007/978-3-319-16664-3">https://doi.org/10.1007/978-3-319-16664-3</a> |
Materials specified |
Springer eBooks |
Public note |
Online access link to the resource |
912 ## - |
-- |
ZDB-2-SCS |
942 ## - ADDED ENTRY ELEMENTS (KOHA) |
Source of classification or shelving scheme |
Library of Congress Classification |
Koha item type |
E-Book |