Academic literature on the topic 'Computer software – Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer software – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Journal articles on the topic "Computer software – Security measures"

1

Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Klevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.

Full text
Abstract:
The paper is devoted to the issues of computer security assessment of instrumentation and control systems (I&C systems) of nuclear power plants (NPPs). The authors specified the main areas of assessing the computer security of NPP I&C systems, especially the assessment of cyber threats, vulnerabilities of I&C computer security, sufficiency of applied measures for ensuring I&C systems computer security, risks of I&C system computer security as well as periodic reassessment of I&C computer security. The paper considers the assessment of I&C computer security vulnerabi
APA, Harvard, Vancouver, ISO, and other styles
3

Sun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.

Full text
Abstract:
This paper of University Library in the computer network security situation analysis, proposed the threat factors of current university library computer network security faces, proposed the university library computer software maintenance and maintenance measures to ensure the safety of computer network application system in the library.
APA, Harvard, Vancouver, ISO, and other styles
4

Courtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Vijayaraghavan, V., Sanjoy Paul, and N. Rajarathnam. "iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts." Information Security Journal: A Global Perspective 19, no. 4 (2010): 213–25. http://dx.doi.org/10.1080/19393551003762223.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Aituganova, Zh T., B. A. Talpakova, and B. K. Zhussipbek. "EFFECTIVE WAYS TO INCREASE THE SECURITY OF STORING INFORMATION IN A DATABASE." BULLETIN Series of Physics & Mathematical Sciences 70, no. 2 (2020): 199–206. http://dx.doi.org/10.51889/2020-2.1728-7901.31.

Full text
Abstract:
In the era of rapid technological development, the issue of information security is very relevant. The article discusses issues related to information security in computer systems due to the simple and quick copying of information through communication channels. The problem of information security covers a wide range of issues, from the legislature to a specific technical device. Program developers suggest the need for technical means of protection that provide a high level of information security. Experience has shown that software cannot guarantee information security. Therefore, any softwar
APA, Harvard, Vancouver, ISO, and other styles
7

Aziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.

Full text
Abstract:
Cloud networks are being used in most industries and applications in the current era. Software-defined networking has come up as an alternative tool and mechanism to follow and implement in a cloud networking environment in place of the traditional networking approaches. This paper includes the security aspects of computer networking concerning the cloud networking environment and software-defined networks. The security risks and vulnerabilities have been listed and described in this work, and the measures that may be adapted to detect, prevent, and control the same. The use of figures, diagra
APA, Harvard, Vancouver, ISO, and other styles
8

Liu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Boutnaru, Shlomi, and Arnon Hershkovitz. "Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language." Interdisciplinary Journal of e-Skills and Lifelong Learning 11 (2015): 123–47. http://dx.doi.org/10.28945/2292.

Full text
Abstract:
In recent years, schools (as well as universities) have added cyber security to their computer science curricula. This topic is still new for most of the current teachers, who would normally have a standard computer science background. Therefore the teachers are trained and then teaching their students what they have just learned. In order to explore differences in both populations’ learning, we compared measures of software quality and security between high-school teachers and students. We collected 109 source files, written in Python by 18 teachers and 31 students, and engineered 32 features
APA, Harvard, Vancouver, ISO, and other styles
10

A. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.

Full text
Abstract:
So far, development and enhancement of global communication networks, distribution of software, and upgrading of computer systems are accompanied by the evolution of criminal environment, with the latter evolving not only within one particular nation but throughout the international community. New opportunities in cyber crime translate into new threats for global information networks and community as a whole, which in terms of preventing and combating cyber crime requires substantial strengthening of information security measures and an approach that is completely different from that applied t
APA, Harvard, Vancouver, ISO, and other styles
More sources

Dissertations / Theses on the topic "Computer software – Security measures"

1

Allam, Sean. "A model to measure the maturuty of smartphone security at software consultancies." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/281.

Full text
Abstract:
Smartphones are proliferating into the workplace at an ever-increasing rate, similarly the threats that they pose is increasing. In an era of constant connectivity and availability, information is freed up of constraints of time and place. This research project delves into the risks introduced by smartphones, and through multiple cases studies, a maturity measurement model is formulated. The model is based on recommendations from two leading information security frameworks, the COBIT 4.1 framework and ISO27002 code of practice. Ultimately, a combination of smartphone specific risks are integra
APA, Harvard, Vancouver, ISO, and other styles
2

Monteiro, Valter. "How intrusion detection can improve software decoy applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMonteiro.pdf.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Colesky, Michael Robert. "SecMVC : a model for secure software design based on the model-view-controller pattern." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1020614.

Full text
Abstract:
Current advances in the software development industry are growing more ubiquitous by the day. This has caused for security, not only in the broader sense, but specifically within the design and overall development of software itself, to become all the more important. An evidently prevalent problem in the domain of software development is that software security is not consistently addressed during design, which undermines core security concerns, and leads to the development of insecure software. This research seeks to address this issue via a model for secure software design, which is based on
APA, Harvard, Vancouver, ISO, and other styles
4

Ma, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.

Full text
Abstract:
This thesis presents the developed taxonomy of the security threats in agent-based distributed systems. Based on this taxonomy, a set of theories is developed to facilitate analyzng the security threats of the mobile-agent systems. We propose the idea of using the developed security risk graph to model the system's vulnerabilties.
APA, Harvard, Vancouver, ISO, and other styles
5

Ur-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.

Full text
Abstract:
Computer security attacks take place due to the presence of vulnerabilities and bugs in software applications. Bugs and vulnerabilities are the result of weak software architecture and lack of standard software development practices. Despite the fact that software companies are investing millions of dollars in the research and development of software designs security risks are still at large. In some cases software applications are found to carry vulnerabilities for many years before being identified. A recent such example is the popular Heart Bleed Bug in the Open SSL/TSL. In today’s world,
APA, Harvard, Vancouver, ISO, and other styles
6

Kaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.

Full text
Abstract:
The Internet supports a perpetually evolving patchwork of network services and applications. Popular applications include the World Wide Web, online commerce, online banking, email, instant messaging, multimedia streaming, and online video games. Practically all networked applications have a common objective: to directly or indirectly process requests generated by humans. Some users employ automation to establish an unfair advantage over non-automated users. The perceived and substantive damages that automated, adversarial users inflict on an application degrade its enjoyment and usability by
APA, Harvard, Vancouver, ISO, and other styles
7

Vibhute, Tejaswini Ajay. "EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments." PDXScholar, 2018. https://pdxscholar.library.pdx.edu/open_access_etds/4485.

Full text
Abstract:
The use of virtualized environments continues to grow for efficient utilization of the available compute resources. Hypervisors virtualize the underlying hardware resources and allow multiple Operating Systems to run simultaneously on the same infrastructure. Since the hypervisor is installed at a higher privilege level than the Operating Systems in the software stack it is vulnerable to rootkits that can modify the environment to gain control, crash the system and even steal sensitive information. Thus, runtime integrity measurement of the hypervisor is essential. The currently proposed solut
APA, Harvard, Vancouver, ISO, and other styles
8

Hughes, Grant Douglas. "A framework for software patch management in a multi-vendor environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2478.

Full text
Abstract:
Thesis (MTech (Information Technology))--Cape Peninsula University of Technology, 2016.<br>Software often requires patches to be installed post-implementation for a variety of reasons. Organisations and individuals, however, do not always promptly install these patches as and when they are released. This study investigated the reasons for the delay or hesitation, identified the challenges, and proposed a model that could assist organisations in overcoming the identified challenges. The research investigated the extent to which the integration of software patch management and enterprise data se
APA, Harvard, Vancouver, ISO, and other styles
9

Xuan, Chaoting. "Countering kernel malware in virtual execution environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31718.

Full text
Abstract:
Thesis (Ph.D)--Electrical and Computer Engineering, Georgia Institute of Technology, 2010.<br>Committee Chair: Copeland A. John; Committee Member: Alessandro Orso; Committee Member: Douglas M. Blough; Committee Member: George F. Riley; Committee Member: Raheem A. Beyah. Part of the SMARTech Electronic Thesis and Dissertation Collection.
APA, Harvard, Vancouver, ISO, and other styles
10

Ransbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.

Full text
Abstract:
In the first essay, I examine value created through external acquisition of nascent technology innovation. External acquisition of new technology is a growing trend in the innovation process, particularly in high technology industries, as firms complement internal efforts with aggressive acquisition programs. Yet, despite its importance, there is little empirical research on the timing of acquisition decisions in high technology environments. I examine the impact of target age on value created for the buyer. Applying an event study methodology to technology acquisitions in the telecommunicatio
APA, Harvard, Vancouver, ISO, and other styles
More sources

Books on the topic "Computer software – Security measures"

1

Manish, Chaitanya, ed. Architecting secure software systems. CRC Press/Taylor & Francis Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sinn, Richard. Software security technologies: A programmatic approach. Thomson/Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ashbaugh, Douglas A. Security software development: Assessing and managing security risks. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Khaled M. Security-aware systems applications and software development methods. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Takanen, Ari. Fuzzing for software security testing and quality assurance. Artech House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Germany) NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 Marktoberdorf. Engineering dependable software systems. IOS Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Open source security tools: Practical applications for security. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Platform security: Software development using the Symbian OS security architecture. Wiley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
More sources

Book chapters on the topic "Computer software – Security measures"

1

Ganji, Daniel, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, and Miltos Petridis. "Conflicts Between Security and Privacy Measures in Software Requirements Engineering." In Communications in Computer and Information Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_29.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Jaatun, Martin Gilje. "Hunting for Aardvarks: Can Software Security Be Measured?" In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_7.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

Hunter, John M. D. "Software Security." In Computer Communications and Networks. Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_10.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Helfrich, James. "Computer Security." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Paladi, Nicolae, Linus Karlsson, and Khalid Elbashir. "Trust Anchors in Software Defined Networks." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Georgiopoulou, Zafeiroula, Eleni-Laskarina Makri, and Costas Lambrinoudakis. "GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_12.

Full text
APA, Harvard, Vancouver, ISO, and other styles
7

Levine, Diane E., John Mason, and Jennifer Hadley. "Software Development and Quality Assurance." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch39.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Scarfone, Karen, Peter Mell, and Murugiah Souppaya. "Managing Software Patches and Vulnerabilities." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch40.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Voorhees, David P. "Software Design and Security." In Texts in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-28501-2_24.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Michael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Conference papers on the topic "Computer software – Security measures"

1

Yeng, Prosper, Bian Yang, and Einar Snekkenes. "Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10239.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Saydjari, O. "Risk: A Good System Security Measure." In 30th Annual International Computer Software and Applications Conference (COMPSAC'06). IEEE, 2006. http://dx.doi.org/10.1109/compsac.2006.74.

Full text
APA, Harvard, Vancouver, ISO, and other styles
3

"Microarchitectures undo software security measures." In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.

Full text
APA, Harvard, Vancouver, ISO, and other styles
4

Zheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.

Full text
APA, Harvard, Vancouver, ISO, and other styles
5

Jing, Wang, Zhuang GuangLei, and Wang ZongChen. "Computer software engineering management measures." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013699.

Full text
APA, Harvard, Vancouver, ISO, and other styles
6

Röhl, Peter J., Raymond M. Kolonay, Michael J. Paradis, and Michael W. Bailey. "Intelligent Compressor Design in a Network-Centric Environment." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/cie-21667.

Full text
Abstract:
Abstract The concept of a federation of distributed devices on a network which enter the federation through a process of “discover and join”, by which they register with a service request broker and publish the services which they perform is applied to engineering software tools. A highly flexible computer architecture is developed, leveraging emerging web technologies like Sun Microsystems’ Jini™, RMI, JavaSpaces, in which engineering software tools like CAD, CAE, PDM, optimization, cost modeling, etc. act as distributed service providers and service requestors. The individual services commun
APA, Harvard, Vancouver, ISO, and other styles
7

Tavares Coimbra, Rodrigo, Antonio Resende, and Ricardo Terra. "A Correlation Analysis between Halstead Complexity Measures and other Software Measures." In 2018 XLIV Latin American Computer Conference (CLEI). IEEE, 2018. http://dx.doi.org/10.1109/clei.2018.00014.

Full text
APA, Harvard, Vancouver, ISO, and other styles
8

Meng, Qingbao. "Computer Network Information Security and Protection Measures." In 2017 7th International Conference on Mechatronics, Computer and Education Informationization (MCEI 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/mcei-17.2017.193.

Full text
APA, Harvard, Vancouver, ISO, and other styles
9

Bottino, Louis. "Security Measures in a Secure Computer Communications Architecture." In 2006 ieee/aiaa 25TH Digital Avionics Systems Conference. IEEE, 2006. http://dx.doi.org/10.1109/dasc.2006.313729.

Full text
APA, Harvard, Vancouver, ISO, and other styles
10

Zhou, Enfeng. "On Computer Network Security Management and Technical Measures." In 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/icence-16.2016.37.

Full text
APA, Harvard, Vancouver, ISO, and other styles

Reports on the topic "Computer software – Security measures"

1

Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.

Full text
APA, Harvard, Vancouver, ISO, and other styles
2

Black, Paul E., and Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.500-320.

Full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!