登入帳戶  | 訂單查詢  | 購物車/收銀台(0) | 在線留言板  | 付款方式  | 聯絡我們  | 運費計算  | 幫助中心 |  加入書簽
會員登入   新用戶註冊
HOME新書上架暢銷書架好書推介特價區會員書架精選月讀2024年度TOP分類閱讀雜誌 香港/國際用戶
最新/最熱/最齊全的簡體書網 品種:超過100萬種書,正品正价,放心網購,悭钱省心 送貨:速遞 / 物流,時效:出貨後2-4日

2025年04月出版新書

2025年03月出版新書

2025年02月出版新書

2025年01月出版新書

2024年12月出版新書

2024年11月出版新書

2024年10月出版新書

2024年09月出版新書

2024年08月出版新書

2024年07月出版新書

2024年06月出版新書

2024年05月出版新書

2024年04月出版新書

2024年03月出版新書

『簡體書』软件安全理论与实践

書城自編碼: 4030843
分類: 簡體書→大陸圖書→教材研究生/本科/专科教材
作者: 张仁斌
國際書號(ISBN): 9787121476082
出版社: 电子工业出版社
出版日期: 2024-03-01

頁數/字數: /
釘裝: 平塑

售價:NT$ 403

我要買

share:

** 我創建的書架 **
未登入.



新書推薦:
刘伯温与哪吒城:北京建城的传说
《 刘伯温与哪吒城:北京建城的传说 》

售價:NT$ 449.0
文化的故事:从岩画艺术到韩国流行音乐(译林思想史)哈佛大学教授沉淀之作 获奖不断 全球热销 亲历文化史上的15个关键点 从史前艺术到当代韩流的人类文化全景
《 文化的故事:从岩画艺术到韩国流行音乐(译林思想史)哈佛大学教授沉淀之作 获奖不断 全球热销 亲历文化史上的15个关键点 从史前艺术到当代韩流的人类文化全景 》

售價:NT$ 398.0
不结婚的社会:双亲如何成为特权,以及家庭为何很重要
《 不结婚的社会:双亲如何成为特权,以及家庭为何很重要 》

售價:NT$ 296.0
怎样决定大事
《 怎样决定大事 》

售價:NT$ 510.0
蓝色机器:感受海洋引擎的深沉脉动
《 蓝色机器:感受海洋引擎的深沉脉动 》

售價:NT$ 449.0
用科学了解面包的“为什么” (全彩图解版)
《 用科学了解面包的“为什么” (全彩图解版) 》

售價:NT$ 449.0
美元霸权的兴衰:它将如何影响全球经济、金融市场和我们的财富(梳理美元发展历程,剖析崛起与衰退的根源)
《 美元霸权的兴衰:它将如何影响全球经济、金融市场和我们的财富(梳理美元发展历程,剖析崛起与衰退的根源) 》

售價:NT$ 296.0
纸上博物馆·文明的崩溃:庞贝+玛雅+美索不达米亚(法国伽利玛原版引进,450+资料图片,16开全彩印刷)
《 纸上博物馆·文明的崩溃:庞贝+玛雅+美索不达米亚(法国伽利玛原版引进,450+资料图片,16开全彩印刷) 》

售價:NT$ 1295.0

建議一齊購買:

+

NT$ 273
《大学语文》
+

NT$ 281
《信息技术(周德锋)》
+

NT$ 254
《机械工程图学习题集(第五版) 谷艳华 闫冠 文立阁著》
+

NT$ 488
《金融学(第二版)(经济科学译丛;“十三五”国家重点出版物出版》
+

NT$ 466
《土地资源学(第6版)》
+

NT$ 275
《高级管理会计》
內容簡介:
本书以软件生命周期为脉络,以软件安全风险评估、风险控制技术及软件安全评估指标、软件安全能力成熟度指标为引领,将安全理念、安全模型、安全方法与常见的软件过程模型相融合,系统介绍在软件开发的每个环节保障软件安全的原理和方法,包括安全需求分析、安全设计、安全编码、安全测试及软件部署运维中安全配置与软件加固等各环节的流程与常用方法,用于全面指导软件安全开发,树立软件开发人员的安全意识,以期减少或杜绝软件的安全问题,提高软件的抗攻击能力和安全可信度,助力软件在各领域、各行业的推广应用。本书适用于高等院校的计算机科学与技术、软件工程、网络空间安全、信息安全专业的本科生,也适用于与软件开发相关的其他各类学生或软件开发从业者。
關於作者:
张仁斌,合肥工业大学计算机与信息学院副教授,2004年参与合肥工业大学新成立的信息安全专业的专业建设,并承担《计算机病毒与反病毒》课程教学工作,此后陆续承担《计算机网络系统实践》《网络工程师综合实训》、《软件安全》《信息安全专业导论》《系统与软件安全综合设计》等多门课程的主讲或实践指导;主编国家”十一·五”规划教材1部(计算机病毒与反病毒技术,第1主编)、安徽省”十一·五”规划教材1部(网络与信息安全系列课程实践教程,第2主编),参编教材2部。主持安徽省教育厅教学研究课题《计算机病毒与网络攻防教学研究与实践》、虚拟仿真实验教学项目《工控网络攻防虚拟仿真实验教学》;主持安徽省年度重点项目8项;参与省市科技攻关项目、863项目13项;公开发表学术论文20余篇。
目錄
第1 章 软件与软件安全······································································································1
1.1 软件安全范畴········································································································1
1.1.1 软件与软件安全的定义····················································································1
1.1.2 软件缺陷与漏洞·····························································································3
1.1.3 软件漏洞分类································································································6
1.1.4 软件安全与其他安全的关系···········································································.12
1.2 软件安全现状·····································································································.15
1.2.1 软件安全总体情况·······················································································.15
1.2.2 系统软件安全现状·······················································································.17
1.2.3 应用软件安全现状·······················································································.18
1.2.4 开源软件安全现状·······················································································.19
1.3 安全事件的根源··································································································.21
1.3.1 软件漏洞是安全问题的焦点···········································································.21
1.3.2 产生软件漏洞的原因····················································································.24
1.4 缓解软件安全问题的途径与方法··········································································.27
1.4.1 缓解软件安全问题的基本策略········································································.27
1.4.2 缓解软件安全问题的工程化方法·····································································.28
1.4.3 软件安全问题的标准化、规范化解决之路·························································.29
1.4.4 缓解软件安全问题的技术探索与举措·······························································.31
实践任务···················································································································.34
任务1:相对路径攻击···························································································.34
任务2:SQL 注入攻击··························································································.35
思考题······················································································································.35
第2 章 软件的工程化安全方法·························································································.36
2.1 软件工程概述·····································································································.36
2.1.1 软件的发展过程··························································································.36
2.1.2 软件危机···································································································.37
2.1.3 软件工程···································································································.38
2.1.4 软件生命周期·····························································································.40
2.2 软件过程模型·····································································································.43
2.2.1 瀑布模型···································································································.44
2.2.2 快速原型模型·····························································································.45
2.2.3 增量模型···································································································.46
2.2.4 螺旋模型···································································································.47
2.2.5 微软MSF 过程模型······················································································.48
2.3 软件质量与软件的安全特性·················································································.49
2.3.1 软件质量···································································································.50
2.3.2 软件的安全特性··························································································.52
2.3.3 软件安全特性与软件质量的关系······

 

 

書城介紹  | 合作申請 | 索要書目  | 新手入門 | 聯絡方式  | 幫助中心 | 找書說明  | 送貨方式 | 付款方式 台灣用户 | 香港/海外用户
megBook.com.tw
Copyright (C) 2013 - 2025 (香港)大書城有限公司 All Rights Reserved.