Security Requirements Engineering Designing Secure Socio-Technical Systems 2016 Edition at Meripustak

Security Requirements Engineering Designing Secure Socio-Technical Systems 2016 Edition

Books from same Author: Fabiano Dalpiaz, Elda Paja, Paolo Giorgini

Books from same Publisher: MIT Press Ltd

Related Category: Author List / Publisher List


  • Retail Price: ₹ 4961/- [ 9.00% off ]

    Seller Price: ₹ 4515

Sold By: T K Pandey      Click for Bulk Order

Offer 1: Get ₹ 111 extra discount on minimum ₹ 500 [Use Code: Bharat]

Offer 2: Get 9.00 % + Flat ₹ 100 discount on shopping of ₹ 1500 [Use Code: IND100]

Offer 3: Get 9.00 % + Flat ₹ 300 discount on shopping of ₹ 5000 [Use Code: MPSTK300]

Free Shipping (for orders above ₹ 499) *T&C apply.

In Stock

Free Shipping Available



Click for International Orders
  • Provide Fastest Delivery

  • 100% Original Guaranteed
  • General Information  
    Author(s)Fabiano Dalpiaz, Elda Paja, Paolo Giorgini
    PublisherMIT Press Ltd
    ISBN9780262034210
    Pages224
    BindingHardback
    LanguageEnglish
    Publish YearJanuary 2016

    Description

    MIT Press Ltd Security Requirements Engineering Designing Secure Socio-Technical Systems 2016 Edition by Fabiano Dalpiaz, Elda Paja, Paolo Giorgini

    A novel, model-driven approach to security requirements engineering that focuses on socio-technical systems rather than merely technical systems.Security requirements engineering is especially challenging because designers must consider not just the software under design but also interactions among people, organizations, hardware, and software. Taking this broader perspective means designing a secure socio-technical system rather than a merely technical system. This book presents a novel, model-driven approach to designing secure socio-technical systems. It introduces the Socio-Technical Modeling Language (STS-ML) and presents a freely available software tool, STS-Tool, that supports this design approach through graphical modeling, automated reasoning capabilities to verify the models constructed, and the automatic derivation of security requirements documents.After an introduction to security requirements engineering and an overview of computer and information security, the book presents the STS-ML modeling language, introducing the modeling concepts used, explaining how to use STS-ML within the STS method for security requirements, and providing guidelines for the creation of models. The book then puts the STS approach into practice, introducing the STS-Tool and presenting two case studies from industry: an online collaborative platform and an e-Government system. Finally, the book considers other methods that can be used in conjunction with the STS method or that constitute an alternative to it. The book is suitable for course use or as a reference for practitioners. Exercises, review questions, and problems appear at the end of each chapter.