logo
Product categories

EbookNice.com

Most ebook files are in PDF format, so you can easily read them using various software such as Foxit Reader or directly on the Google Chrome browser.
Some ebook files are released by publishers in other formats such as .awz, .mobi, .epub, .fb2, etc. You may need to install specific software to read these formats on mobile/PC, such as Calibre.

Please read the tutorial at this link.  https://ebooknice.com/page/post?id=faq


We offer FREE conversion to the popular formats you request; however, this may take some time. Therefore, right after payment, please email us, and we will try to provide the service as quickly as possible.


For some exceptional file formats or broken links (if any), please refrain from opening any disputes. Instead, email us first, and we will try to assist within a maximum of 6 hours.

EbookNice Team

(Ebook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference 1st Edition by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider ISBN 3658067071 9783658067083

  • SKU: EBN-4934700
Zoomable Image
$ 32 $ 40 (-20%)

Status:

Available

4.8

14 reviews
Instant download (eBook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference after payment.
Authors:Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider, (eds.)
Pages:274 pages.
Year:2014
Editon:1
Publisher:Vieweg+Teubner Verlag
Language:english
File Size:6.8 MB
Format:pdf
ISBNS:9783658067076, 9783658067083, 3658067071, 365806708X
Categories: Ebooks

Product desciption

(Ebook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference 1st Edition by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider ISBN 3658067071 9783658067083

(Ebook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference 1st Edition by Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider - Ebook PDF Instant Download/Delivery: 3658067071, 9783658067083
Full download (Ebook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference 1st Edition after payment

Product details:

ISBN 10: 3658067071 
ISBN 13: 9783658067083
Author: Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider

This book presents the most interesting talks given at ISSE 2014 – the forum for the inter-disciplinary discussion of how to adequately secure electronic business processes. The reader may expect state-of-the-art: best papers of the Conference ISSE 2014.

(Ebook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference 1st Table of contents:

1 Secure Design Principles

1.1 threat modeling

  • 1.1.1 cwe references

  • 1.1.2 verification

1.2 use least privilege

  • 1.2.1 cwe references

  • 1.2.2 verification

1.3 implement sandboxing

  • 1.3.1 cwe references

  • 1.3.2 verification


2 Secure Coding Practices

2.1 minimize use of unsafe string and buffer functions

  • 2.1.1 automatic use of safer functions

  • 2.1.2 cwe references

  • 2.1.3 verification

2.2 validate input and output to mitigate common vulnerabilities

  • 2.2.1 cwe references

  • 2.2.2 verification

2.3 use robust integer operations for dynamic memory allocations and array offsets

  • 2.3.1 cwe references

  • 2.3.2 verification

2.4 use anti-cross site scripting (xss) libraries

  • 2.4.1 cwe references

  • 2.4.2 verification

2.5 use canonical data formats

  • 2.5.1 cwe references

  • 2.5.2 verification

2.6 avoid string concatenation for dynamic sql statements

  • 2.6.1 cwe references

  • 2.6.2 verification

2.7 eliminate weak cryptography

  • 2.7.1 cwe references

  • 2.7.2 verification

2.8 use logging and tracing

  • 2.8.1 cwe references

  • 2.8.2 verification


3 Testing Recommendations

3.1 determine attack surface
3.2 use appropriate testing tools
3.3 perform fuzz / robustness testing
3.4 perform penetration testing

  • 3.4.1 cwe references

  • 3.4.2 verification


4 Technology Recommendations

4.1 use a current compiler toolset

  • 4.1.1 cwe references

  • 4.1.2 verification

4.2 use static analysis tools

  • 4.2.1 cwe references

  • 4.2.2 verification


5 Summary of Practices


6 Moving Industry Forward

People also search for (Ebook) ISSE 2014 Securing Electronic Business Processes: Highlights of the Information Security Solutions Europe 2014 Conference 1st:

    
isse issm
    
sec 2014-11
    
isse engineer
    
isse process
    
e-business security issues

Tags: Helmut Reimer, Norbert Pohlmann, Wolfgang Schneider, ISSE

*Free conversion of into popular formats such as PDF, DOCX, DOC, AZW, EPUB, and MOBI after payment.

Related Products