Advances in Information, Communication and Cybersecurity

Advances in Information, Communication and Cybersecurity
Author: Yassine Maleh
Publisher: Springer
Total Pages: 609
Release: 2022-01-13
Genre: Technology & Engineering
ISBN: 9783030917371

This book gathers the proceedings of the International Conference on Information, Communication and Cybersecurity, held on November 10–11, 2021, in Khouribga, Morocco. The conference was jointly coorganized by The National School of Applied Sciences of Sultan Moulay Slimane University, Morocco, and Charles Darwin University, Australia. This book provides an opportunity to account for state-of-the-art works, future trends impacting information technology, communications, and cybersecurity, focusing on elucidating the challenges, opportunities, and inter-dependencies that are just around the corner. This book is helpful for students and researchers as well as practitioners. ICI2C 2021 was devoted to advances in smart information technologies, communication, and cybersecurity. It was considered a meeting point for researchers and practitioners to implement advanced information technologies into various industries. There were 159 paper submissions from 24 countries. Each submission was reviewed by at least three chairs or PC members. We accepted 54 regular papers (34\%). Unfortunately, due to limitations of conference topics and edited volumes, the Program Committee was forced to reject some interesting papers, which did not satisfy these topics or publisher requirements. We would like to thank all authors and reviewers for their work and valuable contributions. The friendly and welcoming attitude of conference supporters and contributors made this event a success!

Continuous Architecture

Continuous Architecture
Author: Murat Erder
Publisher: Morgan Kaufmann
Total Pages: 325
Release: 2015-10-21
Genre: Computers
ISBN: 0128032855

Continuous Architecture provides a broad architectural perspective for continuous delivery, and describes a new architectural approach that supports and enables it. As the pace of innovation and software releases increases, IT departments are tasked to deliver value quickly and inexpensively to their business partners. With a focus on getting software into end-users hands faster, the ultimate goal of daily software updates is in sight to allow teams to ensure that they can release every change to the system simply and efficiently. This book presents an architectural approach to support modern application delivery methods and provide a broader architectural perspective, taking architectural concerns into account when deploying agile or continuous delivery approaches. The authors explain how to solve the challenges of implementing continuous delivery at the project and enterprise level, and the impact on IT processes including application testing, software deployment and software architecture. - Covering the application of enterprise and software architecture concepts to the Agile and Continuous Delivery models - Explains how to create an architecture that can evolve with applications - Incorporates techniques including refactoring, architectural analysis, testing, and feedback-driven development - Provides insight into incorporating modern software development when structuring teams and organizations

Network and System Security

Network and System Security
Author: Mirosław Kutyłowski
Publisher: Springer Nature
Total Pages: 458
Release: 2020-12-18
Genre: Computers
ISBN: 3030657450

This book constitutes the refereed proceedings of the 14th International Conference on Network and System Security, NSS 2020, held in Melbourne, VIC, Australia, in November 2020. The 17 full and 9 short papers were carefully reviewed and selected from 60 submissions. The selected papers are devoted to topics such as secure operating system architectures, applications programming and security testing, intrusion and attack detection, cybersecurity intelligence, access control, cryptographic techniques, cryptocurrencies, ransomware, anonymity, trust, recommendation systems, as well machine learning problems. Due to the Corona pandemic the event was held virtually.

Advanced Data Mining and Applications

Advanced Data Mining and Applications
Author: Shuigeng Zhou
Publisher: Springer Science & Business Media
Total Pages: 812
Release: 2012-12-09
Genre: Computers
ISBN: 3642355277

This book constitutes the refereed proceedings of the 8th International Conference on Advanced Data Mining and Applications, ADMA 2012, held in Nanjing, China, in December 2012. The 32 regular papers and 32 short papers presented in this volume were carefully reviewed and selected from 168 submissions. They are organized in topical sections named: social media mining; clustering; machine learning: algorithms and applications; classification; prediction, regression and recognition; optimization and approximation; mining time series and streaming data; Web mining and semantic analysis; data mining applications; search and retrieval; information recommendation and hiding; outlier detection; topic modeling; and data cube computing.

Source Code Modularization

Source Code Modularization
Author: Ayaz Isazadeh
Publisher: Springer
Total Pages: 272
Release: 2017-10-10
Genre: Computers
ISBN: 3319633465

This book presents source code modularization as a key activity in reverse engineering to extract the software architecture from the existing source code. To this end, it provides detailed techniques for source code modularization and discusses their effects on different software quality attributes. Nonetheless, it is not a mere survey of source code modularization algorithms, but rather a consistent and unifying theoretical modularization framework, and as such is the first publication that comprehensively examines the models and techniques for source code modularization. It enables readers to gain a thorough understanding of topics like software artifacts proximity, hierarchical and partitional modularization algorithms, search- and algebraic-based software modularization, software modularization evaluation techniques and software quality attributes and modularization. This book introduces students and software professionals to the fundamental ideas of source code modularization concepts, similarity/dissimilarity metrics, modularization metrics, and quality assurance. Further, it allows undergraduate and graduate students in software engineering, computer science, and computer engineering with no prior experience in the software industry to explore the subject in a step-by-step manner. Practitioners benefit from the structured presentation and comprehensive nature of the materials, while the large number of bibliographic references makes this book a valuable resource for researchers working on source code modularization.

Secure Programming with Static Analysis

Secure Programming with Static Analysis
Author: Brian Chess
Publisher: Pearson Education
Total Pages: 1101
Release: 2007-06-29
Genre: Computers
ISBN: 0132702029

The First Expert Guide to Static Analysis for Software Security! Creating secure code requires more than just good intentions. Programmers need to know that their code will be safe in an almost infinite number of scenarios and configurations. Static source code analysis gives users the ability to review their work with a fine-toothed comb and uncover the kinds of errors that lead directly to security vulnerabilities. Now, there’s a complete guide to static analysis: how it works, how to integrate it into the software development processes, and how to make the most of it during security code review. Static analysis experts Brian Chess and Jacob West look at the most common types of security defects that occur today. They illustrate main points using Java and C code examples taken from real-world security incidents, showing how coding errors are exploited, how they could have been prevented, and how static analysis can rapidly uncover similar mistakes. This book is for everyone concerned with building more secure software: developers, security engineers, analysts, and testers.

Software Security

Software Security
Author: Gary McGraw
Publisher: Addison-Wesley Professional
Total Pages: 450
Release: 2006
Genre: Computers
ISBN: 0321356705

A computer security expert shows readers how to build more secure software by building security in and putting it into practice. The CD-ROM contains a tutorial and demo of the Fortify Source Code Analysis Suite.

2020 International Symposium on Theoretical Aspects of Software Engineering (TASE)

2020 International Symposium on Theoretical Aspects of Software Engineering (TASE)
Author: IEEE Staff
Publisher:
Total Pages:
Release: 2020-12-11
Genre:
ISBN: 9781728164625

Modern society is increasingly dependent on software systems that are becoming larger and more complex This poses new challenges to the various aspects of software engineering, for instance, software dependability in trusted computing, interaction with physical components in cyber physical systems, quality assuarance in AI systems, distribution in cloud computing applications, security and privacy in general Hence, new concepts and methodologies are required to enhance the development of software engineering from theoretical aspects

Agile Software Architecture

Agile Software Architecture
Author: Muhammad Ali Babar
Publisher: Newnes
Total Pages: 433
Release: 2013-11-27
Genre: Computers
ISBN: 0124078850

Agile software development approaches have had significant impact on industrial software development practices. Today, agile software development has penetrated to most IT companies across the globe, with an intention to increase quality, productivity, and profitability. Comprehensive knowledge is needed to understand the architectural challenges involved in adopting and using agile approaches and industrial practices to deal with the development of large, architecturally challenging systems in an agile way. Agile Software Architecture focuses on gaps in the requirements of applying architecture-centric approaches and principles of agile software development and demystifies the agile architecture paradox. Readers will learn how agile and architectural cultures can co-exist and support each other according to the context. Moreover, this book will also provide useful leads for future research in architecture and agile to bridge such gaps by developing appropriate approaches that incorporate architecturally sound practices in agile methods. - Presents a consolidated view of the state-of-art and state-of-practice as well as the newest research findings - Identifies gaps in the requirements of applying architecture-centric approaches and principles of agile software development and demystifies the agile architecture paradox - Explains whether or not and how agile and architectural cultures can co-exist and support each other depending upon the context - Provides useful leads for future research in both architecture and agile to bridge such gaps by developing appropriate approaches, which incorporate architecturally sound practices in agile methods

Perl Best Practices

Perl Best Practices
Author: Damian Conway
Publisher: "O'Reilly Media, Inc."
Total Pages: 542
Release: 2005-07-12
Genre: Computers
ISBN: 0596001738

This book offers a collection of 256 guidelines on the art of coding to help you write better Perl code--in fact, the best Perl code you possibly can. The guidelines cover code layout, naming conventions, choice of data and control structures, program decomposition, interface design and implementation, modularity, object orientation, error handling, testing, and debugging. - Publisher