国产第1页_91在线亚洲_中文字幕成人_99久久久久久_五月宗合网_久久久久国产一区二区三区四区

讀書月攻略拿走直接抄!
歡迎光臨中圖網 請 | 注冊
> >
軟件安全理論與實踐

包郵 軟件安全理論與實踐

出版社:電子工業出版社出版時間:2024-03-01
開本: 26cm 頁數: 345頁
本類榜單:教材銷量榜
中 圖 價:¥57.1(7.2折) 定價  ¥79.0 登錄后可看到會員價
加入購物車 收藏
開年大促, 全場包郵
?新疆、西藏除外
本類五星書更多>

軟件安全理論與實踐 版權信息

軟件安全理論與實踐 內容簡介

本書以軟件生命周期為脈絡,以軟件安全風險評估、風險控制技術及軟件安全評估指標、軟件安全能力成熟度指標為引領,將安全理念、安全模型、安全方法與常見的軟件過程模型相融合,系統介紹在軟件開發的每個環節保障軟件安全的原理和方法,包括安全需求分析、安全設計、安全編碼、安全測試及軟件部署運維中安全配置與軟件加固等各環節的流程與常用方法,用于全面指導軟件安全開發,樹立軟件開發人員的安全意識,以期減少或杜絕軟件的安全問題,提高軟件的抗攻擊能力和安全可信度,助力軟件在各領域、各行業的推廣應用。本書適用于高等院校的計算機科學與技術、軟件工程、網絡空間安全、信息安全專業的本科生,也適用于與軟件開發相關的其他各類學生或軟件開發從業者。

軟件安全理論與實踐 目錄

第1 章 軟件與軟件安全······································································································1
1.1 軟件安全范疇········································································································1
1.1.1 軟件與軟件安全的定義····················································································1
1.1.2 軟件缺陷與漏洞·····························································································3
1.1.3 軟件漏洞分類································································································6
1.1.4 軟件安全與其他安全的關系···········································································.12
1.2 軟件安全現狀·····································································································.15
1.2.1 軟件安全總體情況·······················································································.15
1.2.2 系統軟件安全現狀·······················································································.17
1.2.3 應用軟件安全現狀·······················································································.18
1.2.4 開源軟件安全現狀·······················································································.19
1.3 安全事件的根源··································································································.21
1.3.1 軟件漏洞是安全問題的焦點···········································································.21
1.3.2 產生軟件漏洞的原因····················································································.24
1.4 緩解軟件安全問題的途徑與方法··········································································.27
1.4.1 緩解軟件安全問題的基本策略········································································.27
1.4.2 緩解軟件安全問題的工程化方法·····································································.28
1.4.3 軟件安全問題的標準化、規范化解決之路·························································.29
1.4.4 緩解軟件安全問題的技術探索與舉措·······························································.31
實踐任務···················································································································.34
任務1:相對路徑攻擊···························································································.34
任務2:SQL 注入攻擊··························································································.35
思考題······················································································································.35
第2 章 軟件的工程化安全方法·························································································.36
2.1 軟件工程概述·····································································································.36
2.1.1 軟件的發展過程··························································································.36
2.1.2 軟件危機···································································································.37
2.1.3 軟件工程···································································································.38
2.1.4 軟件生命周期·····························································································.40
2.2 軟件過程模型·····································································································.43
2.2.1 瀑布模型···································································································.44
2.2.2 快速原型模型·····························································································.45
2.2.3 增量模型···································································································.46
2.2.4 螺旋模型···································································································.47
2.2.5 微軟MSF 過程模型······················································································.48
2.3 軟件質量與軟件的安全特性·················································································.49
2.3.1 軟件質量···································································································.50
2.3.2 軟件的安全特性··························································································.52
2.3.3 軟件安全特性與軟件質量的關系······
展開全部

軟件安全理論與實踐 作者簡介

張仁斌,合肥工業大學計算機與信息學院副教授,2004年參與合肥工業大學新成立的信息安全專業的專業建設,并承擔《計算機病毒與反病毒》課程教學工作,此后陸續承擔《計算機網絡系統實踐》《網絡工程師綜合實訓》、《軟件安全》《信息安全專業導論》《系統與軟件安全綜合設計》等多門課程的主講或實踐指導;主編國家"十一·五”規劃教材1部(計算機病毒與反病毒技術,第1主編)、安徽省"十一·五”規劃教材1部(網絡與信息安全系列課程實踐教程,第2主編),參編教材2部。主持安徽省教育廳教學研究課題《計算機病毒與網絡攻防教學研究與實踐》、虛擬仿真實驗教學項目《工控網絡攻防虛擬仿真實驗教學》;主持安徽省年度重點項目8項;參與省市科技攻關項目、863項目13項;公開發表學術論文20余篇。

商品評論(0條)
暫無評論……
書友推薦
編輯推薦
返回頂部
中圖網
在線客服
主站蜘蛛池模板: 91日韩精品天海翼在线观看 | 日本夜免费视频视频大片 | 国产萝控精品福利视频免费 | 亚洲国产精品嫩草影院 | 国产亚洲美女精品久久久久狼 | 国产成人亚洲综合网站不卡 | 国产午夜精华无码网站 | 97精品国产91久久久久久久 | 久久国产综合尤物免费观看 | 久草视频免费 | 国产精品丝袜久久久久久不卡 | 欧美成人久久一级c片免费 欧美成人看片黄a免费看 | 麻豆精品在线播放 | 久草网视频在线观看 | 日本一区二区三区精品国产 | 东京热一精品无码av | 久久这里只有精品18 | 久久久午夜精品福利内容 | 国产成人精品久久一区二区小说 | 亚洲欧美日韩精品一区 | 亚洲国产日韩欧美在线a乱码 | 国产精品三级在线 | 色娜娜精品视频在线播放 | 蜜臀av色欲a片无码精品一区 | 美女黄18以下禁止观看 | 漂亮的保姆4-bd国语在线观看 | 红色毛片| 特级欧美aaaaaaa免费观看 | 日韩中文字幕视频在线观看 | 亚洲在线国产日韩欧美 | 一本大道无码人妻精品专区 | 亚洲男人天堂av | 蜜桃bt天堂精品视频在线观看 | 成人无码免费一区二区三区 | 久久经典视频 | 午夜视频福利在线 | 深夜福利国产精品亚洲尤物 | 公么大龟弄得我好舒服秀婷视频 | 色多多www| 在线观看亚洲专区 | 国产亚洲精品成人一区看片 |