Book Description
"Domain-Driven Design" incorporates numerous examples in Java-case studies taken from actual projects that illustrate the application of domain-driven design to real-world software development.
Author : Eric Evans
Publisher : Addison-Wesley Professional
Page : 563 pages
File Size : 29,48 MB
Release : 2004
Category : Computers
ISBN : 0321125215
"Domain-Driven Design" incorporates numerous examples in Java-case studies taken from actual projects that illustrate the application of domain-driven design to real-world software development.
Author : National Research Council
Publisher : National Academies Press
Page : 320 pages
File Size : 31,10 MB
Release : 1990-02-01
Category : Computers
ISBN : 0309043883
Computers at Risk presents a comprehensive agenda for developing nationwide policies and practices for computer security. Specific recommendations are provided for industry and for government agencies engaged in computer security activities. The volume also outlines problems and opportunities in computer security research, recommends ways to improve the research infrastructure, and suggests topics for investigators. The book explores the diversity of the field, the need to engineer countermeasures based on speculation of what experts think computer attackers may do next, why the technology community has failed to respond to the need for enhanced security systems, how innovators could be encouraged to bring more options to the marketplace, and balancing the importance of security against the right of privacy.
Author : John M. Borky
Publisher : Springer
Page : 788 pages
File Size : 45,62 MB
Release : 2018-09-08
Category : Technology & Engineering
ISBN : 3319956698
This textbook presents a proven, mature Model-Based Systems Engineering (MBSE) methodology that has delivered success in a wide range of system and enterprise programs. The authors introduce MBSE as the state of the practice in the vital Systems Engineering discipline that manages complexity and integrates technologies and design approaches to achieve effective, affordable, and balanced system solutions to the needs of a customer organization and its personnel. The book begins with a summary of the background and nature of MBSE. It summarizes the theory behind Object-Oriented Design applied to complex system architectures. It then walks through the phases of the MBSE methodology, using system examples to illustrate key points. Subsequent chapters broaden the application of MBSE in Service-Oriented Architectures (SOA), real-time systems, cybersecurity, networked enterprises, system simulations, and prototyping. The vital subject of system and architecture governance completes the discussion. The book features exercises at the end of each chapter intended to help readers/students focus on key points, as well as extensive appendices that furnish additional detail in particular areas. The self-contained text is ideal for students in a range of courses in systems architecture and MBSE as well as for practitioners seeking a highly practical presentation of MBSE principles and techniques.
Author : Bedir Tekinerdogan
Publisher : Elsevier
Page : 360 pages
File Size : 16,94 MB
Release : 2023-09-04
Category : Technology & Engineering
ISBN : 0323993311
Management and Engineering of Critical Infrastructures focuses on two important aspects of CIS, management and engineering. The book provides an ontological foundation for the models and methods needed to design a set of systems, networks and assets that are essential for a society's functioning, and for ensuring the security, safety and economy of a nation. Various examples in agriculture, the water supply, public health, transportation, security services, electricity generation, telecommunication, and financial services can be used to substantiate dangers. Disruptions of CIS can have serious cascading consequences that would stop society from functioning properly and result in loss of life.Malicious software (a.k.a., malware), for example, can disrupt the distribution of electricity across a region, which in turn can lead to the forced shutdown of communication, health and financial sectors. Subsequently, proper engineering and management are important to anticipate possible risks and threats and provide resilient CIS. Although the problem of CIS has been broadly acknowledged and discussed, to date, no unifying theory nor systematic design methods, techniques and tools exist for such CIS. - Presents key problems, solution approaches and tools developed, or necessary for, assessing and managing critical infrastructures - Investigates basic theory and foundations of current research topics, related challenges, and future research directions for CIS - Offers an interdisciplinary approach, considering management, engineering and specific challenges (dynamism and scalability) surrounding the digitization of CIS services
Author : Arthur J. Deane
Publisher : John Wiley & Sons
Page : 740 pages
File Size : 36,66 MB
Release : 2021-08-11
Category : Computers
ISBN : 111979000X
The only official, comprehensive reference guide to the CISSP Thoroughly updated for 2021 and beyond, this is the authoritative common body of knowledge (CBK) from (ISC)2 for information security professionals charged with designing, engineering, implementing, and managing the overall information security program to protect organizations from increasingly sophisticated attacks. Vendor neutral and backed by (ISC)2, the CISSP credential meets the stringent requirements of ISO/IEC Standard 17024. This CBK covers the current eight domains of CISSP with the necessary depth to apply them to the daily practice of information security. Revised and updated by a team of subject matter experts, this comprehensive reference covers all of the more than 300 CISSP objectives and sub-objectives in a structured format with: Common and good practices for each objective Common vocabulary and definitions References to widely accepted computing standards Highlights of successful approaches through case studies Whether you've earned your CISSP credential or are looking for a valuable resource to help advance your security career, this comprehensive guide offers everything you need to apply the knowledge of the most recognized body of influence in information security.
Author : Christos Douligeris
Publisher : John Wiley & Sons
Page : 592 pages
File Size : 25,72 MB
Release : 2007-02-09
Category : Computers
ISBN : 0470099739
A unique overview of network security issues, solutions, and methodologies at an architectural and research level Network Security provides the latest research and addresses likely future developments in network security protocols, architectures, policy, and implementations. It covers a wide range of topics dealing with network security, including secure routing, designing firewalls, mobile agent security, Bluetooth security, wireless sensor networks, securing digital content, and much more. Leading authorities in the field provide reliable information on the current state of security protocols, architectures, implementations, and policies. Contributors analyze research activities, proposals, trends, and state-of-the-art aspects of security and provide expert insights into the future of the industry. Complete with strategies for implementing security mechanisms and techniques, Network Security features: * State-of-the-art technologies not covered in other books, such as Denial of Service (DoS) and Distributed Denial-of-Service (DDoS) attacks and countermeasures * Problems and solutions for a wide range of network technologies, from fixed point to mobile * Methodologies for real-time and non-real-time applications and protocols
Author : Alasdair Gilchrist
Publisher : Alasdair Gilchrist
Page : 185 pages
File Size : 20,14 MB
Release : 2015-06-20
Category : Computers
ISBN :
This book, 'A Concise Guide to SSL/TLS for DevOps' is an introduction to SSL & TLS in application and operational environments and as such is a more technical in depth study than is typically the case in the Executive and Management series. This book aims to cover the theory and practice of SSL in working operational situations. Consequently, although no prior knowledge of authentication and encryption methods is required, a good deal of this text will involve certificate and encryption theory, OpenSSL installation and configuration, SSL vulnerabilities and best practices in SSL certificate management.
Author : Chengfei Liu
Publisher : Springer
Page : 811 pages
File Size : 29,70 MB
Release : 2012-10-26
Category : Computers
ISBN : 364234321X
This book constitutes the conference proceedings of the 10th International Conference on Service-Oriented Computing, ICSOC 2012, held in Shanghai, China in November 2012. The 32 full papers and 21 short papers presented were carefully reviewed and selected from 185 submissions. The papers are organized in topical sections on service engineering, service management, cloud, service QoS, service security, privacy and personalization, service applications in business and society, service composition and choreography, service scaling and cloud, process management, service description and discovery, service security, privacy and personalization, applications, as well as cloud computing.
Author : Vincent C. Hu
Publisher : Artech House
Page : 285 pages
File Size : 14,31 MB
Release : 2017-10-31
Category : Computers
ISBN : 1630814962
This comprehensive new resource provides an introduction to fundamental Attribute Based Access Control (ABAC) models. This book provides valuable information for developing ABAC to improve information sharing within organizations while taking into consideration the planning, design, implementation, and operation. It explains the history and model of ABAC, related standards, verification and assurance, applications, as well as deployment challenges. Readers find authoritative insight into specialized topics including formal ABAC history, ABAC’s relationship with other access control models, ABAC model validation and analysis, verification and testing, and deployment frameworks such as XACML. Next Generation Access Model (NGAC) is explained, along with attribute considerations in implementation. The book explores ABAC applications in SOA/workflow domains, ABAC architectures, and includes details on feature sets in commercial and open source products. This insightful resource presents a combination of technical and administrative information for models, standards, and products that will benefit researchers as well as implementers of ABAC systems in the field.
Author : Tran Khanh Dang
Publisher : Springer Nature
Page : 499 pages
File Size : 25,23 MB
Release : 2020-11-19
Category : Computers
ISBN : 9813343702
This book constitutes the proceedings of the 7th International Conference on Future Data and Security Engineering, FDSE 2020, held in Quy Nhon, Vietnam, in November 2020.* The 29 full papers and 8 short were carefully reviewed and selected from 161 submissions. The selected papers are organized into the following topical headings: big data analytics and distributed systems; security and privacy engineering; industry 4.0 and smart city: data analytics and security; data analytics and healthcare systems; machine learning-based big data processing; emerging data management systems and applications; and short papers: security and data engineering. * The conference was held virtually due to the COVID-19 pandemic.