Software safety and security tools for analysis and verification /
Zapisane w:
organizacja autorów: | NATO Advanced Study Institute on Tools for Analysis and Verification of Software Safety and Security Bayrischzell, Germany, NATO Emerging Security Challenges Division, ebrary, Inc |
---|---|
Kolejni autorzy: | Nipkow, Tobias, 1958-, Grumberg, Orna, Hauptmann, Benedikt |
Format: | Elektroniczne Materiały konferencyjne E-book |
Język: | angielski |
Wydane: |
Washington, D.C. :
IOS Press,
2012.
|
Seria: | NATO science for peace and security series. Information and communication security ;
v. 33. |
Hasła przedmiotowe: | |
Dostęp online: | An electronic book accessible through the World Wide Web; click to view |
Etykiety: |
Dodaj etykietę
Nie ma etykietki, Dołącz pierwszą etykiete!
|
Podobne zapisy
Engineering dependable software systems /
Wydane: (2013)
Wydane: (2013)
Dependable software systems engineering /
Wydane: (2015)
Wydane: (2015)
The software audit guide /
od: Helgeson, John W., 1945-
Wydane: (2009)
od: Helgeson, John W., 1945-
Wydane: (2009)
Software and systems safety specification and verification /
Wydane: (2011)
Wydane: (2011)
Principles of model checking
od: Baier, Christel
Wydane: (2008)
od: Baier, Christel
Wydane: (2008)
Verification of infinite-state systems with applications to security
Wydane: (2006)
Wydane: (2006)
Software systems safety /
Wydane: (2014)
Wydane: (2014)
Software system reliability and security
Wydane: (2007)
Wydane: (2007)
Robot framework test automation /
od: Bisht, Sumit
Wydane: (2013)
od: Bisht, Sumit
Wydane: (2013)
Verification of systems and circuits using LOTOS, Petri Nets, and CCS
od: Yoeli, Michael, 1917-
Wydane: (2008)
od: Yoeli, Michael, 1917-
Wydane: (2008)
Fuzzing for software security testing and quality assurance
od: Takanen, Ari
Wydane: (2008)
od: Takanen, Ari
Wydane: (2008)
New trends in software methodologies, tools and techniques
Wydane: (2007)
Wydane: (2007)
New trends in software methodologies, tools and techniques proceedings of Lyee-W02 /
Wydane: (2002)
Wydane: (2002)
New trends in software methodologies, tools and techniques proceedings of the eleventh SoMeT_12 /
od: Fujita, Hamido
Wydane: (2012)
od: Fujita, Hamido
Wydane: (2012)
New trends in software methodologies, tools and techniques proceedings of the seventh SoMeT_08 /
Wydane: (2008)
Wydane: (2008)
New trends in software methodologies, tools and techniques Proceedings of the fourth SoMeT_ W05 /
Wydane: (2005)
Wydane: (2005)
Comprehensive functional verification the complete industry cycle
od: Wile, Bruce
Wydane: (2005)
od: Wile, Bruce
Wydane: (2005)
Mathematical software proceedings of the first International Congress of Mathematical Software : Beijing, China, 17-19 August 2002 /
Wydane: (2002)
Wydane: (2002)
Knowledge-based software engineering proceedings of the fifth Joint Conference on Knowledge-Based Software Engineering /
Wydane: (2002)
Wydane: (2002)
Knowledge-based software engineering proceedings of the Seventh Joint Conference on Knowledge-based Software Engineering /
Wydane: (2006)
Wydane: (2006)
Metamodeling-driven IP reuse for SoC integration and microprocessor design
od: Mathaikutty, Deepak A.
Wydane: (2009)
od: Mathaikutty, Deepak A.
Wydane: (2009)
Knowledge-based software engineering proceedings of the Tenth Joint Conference on Knowledge-Based Software Engineering /
Wydane: (2012)
Wydane: (2012)
Formal logical methods for system security and correctness
Wydane: (2008)
Wydane: (2008)
Crackproof your software the best ways to protect your software against crackers /
od: C̆ervĕn, Pavol
Wydane: (2002)
od: C̆ervĕn, Pavol
Wydane: (2002)
Trust and security in collaborative computing
od: Zou, Xukai, 1963-
Wydane: (2008)
od: Zou, Xukai, 1963-
Wydane: (2008)
Modelling cyber security approaches, methodology, strategies /
Wydane: (2009)
Wydane: (2009)
Multicore hardware-software design and verification techniques
Wydane: (2011)
Wydane: (2011)
Safety management for software-based equipment
od: Boulanger, Jean-Louis
Wydane: (2013)
od: Boulanger, Jean-Louis
Wydane: (2013)
Federated identity management and web services security with IBM tivoli security solutions
od: Bücker, Axel
Wydane: (2005)
od: Bücker, Axel
Wydane: (2005)
Spring Security 3.1 secure your web applications from hackers with the step-by-step guide /
od: Winch, Robert
Wydane: (2012)
od: Winch, Robert
Wydane: (2012)
Secure telematic applications for national scale projects
Wydane: (2008)
Wydane: (2008)
Static analysis of software the abstract interpretation /
Wydane: (2012)
Wydane: (2012)
Algorithms, architectures and information systems security
Wydane: (2009)
Wydane: (2009)
Software estimation best practices, tools & techniques a complete guide for software project estimators /
od: Chemuturi, Murali, 1950-
Wydane: (2009)
od: Chemuturi, Murali, 1950-
Wydane: (2009)
Identity, security and democracy the wider social and ethical implications of automated systems for human identification /
Wydane: (2009)
Wydane: (2009)
Software testing techniques finding the defects that matter /
Wydane: (2005)
Wydane: (2005)
Practical malware analysis the hands-on guide to dissecting malicious software /
od: Sikorski, Michael
Wydane: (2012)
od: Sikorski, Michael
Wydane: (2012)
Guide to advanced software testing
od: Hass, Anne Mette Jonassen
Wydane: (2008)
od: Hass, Anne Mette Jonassen
Wydane: (2008)
Software design methodology
od: Zhu, Hong, 1961-
Wydane: (2005)
od: Zhu, Hong, 1961-
Wydane: (2005)
Software engineering architecture-driven software development /
od: Schmidt, Richard, 1956-
Wydane: (2013)
od: Schmidt, Richard, 1956-
Wydane: (2013)
Podobne zapisy
-
Engineering dependable software systems /
Wydane: (2013) -
Dependable software systems engineering /
Wydane: (2015) -
The software audit guide /
od: Helgeson, John W., 1945-
Wydane: (2009) -
Software and systems safety specification and verification /
Wydane: (2011) -
Principles of model checking
od: Baier, Christel
Wydane: (2008)