Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns

Author:   Clive Blackwell ,  Hong Zhu
Publisher:   Springer International Publishing AG
Edition:   Softcover reprint of the original 1st ed. 2014
ISBN:  

9783319352183


Pages:   264
Publication Date:   03 September 2016
Format:   Paperback
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Our Price $216.06 Quantity:  
Add to Cart

Share |

Cyberpatterns: Unifying Design Patterns with Security and Attack Patterns


Add your own review!

Overview

Cyberspace in increasingly important to people in their everyday lives for purchasing goods on the Internet, to energy supply increasingly managed remotely using Internet protocols. Unfortunately, this dependence makes us susceptible to attacks from nation states, terrorists, criminals and hactivists. Therefore, we need a better understanding of cyberspace, for which patterns, which are predictable regularities, may help to detect, understand and respond to incidents better. The inspiration for the workshop came from the existing work on formalising design patterns applied to cybersecurity, but we also need to understand the many other types of patterns that arise in cyberspace.

Full Product Details

Author:   Clive Blackwell ,  Hong Zhu
Publisher:   Springer International Publishing AG
Imprint:   Springer International Publishing AG
Edition:   Softcover reprint of the original 1st ed. 2014
Dimensions:   Width: 15.50cm , Height: 1.50cm , Length: 23.50cm
Weight:   4.219kg
ISBN:  

9783319352183


ISBN 10:   3319352180
Pages:   264
Publication Date:   03 September 2016
Audience:   Professional and scholarly ,  Professional & Vocational
Format:   Paperback
Publisher's Status:   Active
Availability:   Manufactured on demand   Availability explained
We will order this item for you from a manufactured on demand supplier.

Table of Contents

Reviews

From the book reviews: It is recommended reading for academics with an interest in the area. Its secondary audience would be security professionals and software developers. ... This well-written book achieves its purposes--to describe the current state of research in the subject area and to outline directions for future research--quite well. (Neil D. Burgess, Computing Reviews, September, 2014)


Author Information

Tab Content 6

Author Website:  

Customer Reviews

Recent Reviews

No review item found!

Add your own review!

Countries Available

All regions
Latest Reading Guide

Aorrng

Shopping Cart
Your cart is empty
Shopping cart
Mailing List