国产第1页_91在线亚洲_中文字幕成人_99久久久久久_五月宗合网_久久久久国产一区二区三区四区

讀書月攻略拿走直接抄!
歡迎光臨中圖網 請 | 注冊
> >
軟件安全理論與實踐

包郵 軟件安全理論與實踐

出版社:電子工業出版社出版時間:2024-03-01
開本: 26cm 頁數: 345頁
本類榜單:教材銷量榜
中 圖 價:¥57.1(7.2折) 定價  ¥79.0 登錄后可看到會員價
加入購物車 收藏
開年大促, 全場包郵
?新疆、西藏除外
本類五星書更多>

軟件安全理論與實踐 版權信息

軟件安全理論與實踐 內容簡介

本書以軟件生命周期為脈絡,以軟件安全風險評估、風險控制技術及軟件安全評估指標、軟件安全能力成熟度指標為引領,將安全理念、安全模型、安全方法與常見的軟件過程模型相融合,系統介紹在軟件開發的每個環節保障軟件安全的原理和方法,包括安全需求分析、安全設計、安全編碼、安全測試及軟件部署運維中安全配置與軟件加固等各環節的流程與常用方法,用于全面指導軟件安全開發,樹立軟件開發人員的安全意識,以期減少或杜絕軟件的安全問題,提高軟件的抗攻擊能力和安全可信度,助力軟件在各領域、各行業的推廣應用。本書適用于高等院校的計算機科學與技術、軟件工程、網絡空間安全、信息安全專業的本科生,也適用于與軟件開發相關的其他各類學生或軟件開發從業者。

軟件安全理論與實踐 目錄

第1 章 軟件與軟件安全······································································································1
1.1 軟件安全范疇········································································································1
1.1.1 軟件與軟件安全的定義····················································································1
1.1.2 軟件缺陷與漏洞·····························································································3
1.1.3 軟件漏洞分類································································································6
1.1.4 軟件安全與其他安全的關系···········································································.12
1.2 軟件安全現狀·····································································································.15
1.2.1 軟件安全總體情況·······················································································.15
1.2.2 系統軟件安全現狀·······················································································.17
1.2.3 應用軟件安全現狀·······················································································.18
1.2.4 開源軟件安全現狀·······················································································.19
1.3 安全事件的根源··································································································.21
1.3.1 軟件漏洞是安全問題的焦點···········································································.21
1.3.2 產生軟件漏洞的原因····················································································.24
1.4 緩解軟件安全問題的途徑與方法··········································································.27
1.4.1 緩解軟件安全問題的基本策略········································································.27
1.4.2 緩解軟件安全問題的工程化方法·····································································.28
1.4.3 軟件安全問題的標準化、規范化解決之路·························································.29
1.4.4 緩解軟件安全問題的技術探索與舉措·······························································.31
實踐任務···················································································································.34
任務1:相對路徑攻擊···························································································.34
任務2:SQL 注入攻擊··························································································.35
思考題······················································································································.35
第2 章 軟件的工程化安全方法·························································································.36
2.1 軟件工程概述·····································································································.36
2.1.1 軟件的發展過程··························································································.36
2.1.2 軟件危機···································································································.37
2.1.3 軟件工程···································································································.38
2.1.4 軟件生命周期·····························································································.40
2.2 軟件過程模型·····································································································.43
2.2.1 瀑布模型···································································································.44
2.2.2 快速原型模型·····························································································.45
2.2.3 增量模型···································································································.46
2.2.4 螺旋模型···································································································.47
2.2.5 微軟MSF 過程模型······················································································.48
2.3 軟件質量與軟件的安全特性·················································································.49
2.3.1 軟件質量···································································································.50
2.3.2 軟件的安全特性··························································································.52
2.3.3 軟件安全特性與軟件質量的關系······
展開全部

軟件安全理論與實踐 作者簡介

張仁斌,合肥工業大學計算機與信息學院副教授,2004年參與合肥工業大學新成立的信息安全專業的專業建設,并承擔《計算機病毒與反病毒》課程教學工作,此后陸續承擔《計算機網絡系統實踐》《網絡工程師綜合實訓》、《軟件安全》《信息安全專業導論》《系統與軟件安全綜合設計》等多門課程的主講或實踐指導;主編國家"十一·五”規劃教材1部(計算機病毒與反病毒技術,第1主編)、安徽省"十一·五”規劃教材1部(網絡與信息安全系列課程實踐教程,第2主編),參編教材2部。主持安徽省教育廳教學研究課題《計算機病毒與網絡攻防教學研究與實踐》、虛擬仿真實驗教學項目《工控網絡攻防虛擬仿真實驗教學》;主持安徽省年度重點項目8項;參與省市科技攻關項目、863項目13項;公開發表學術論文20余篇。

商品評論(0條)
暫無評論……
書友推薦
編輯推薦
返回頂部
中圖網
在線客服
主站蜘蛛池模板: 激情内射亚洲一区二区三区 | 亚洲中文字幕无码爆乳app | 成人一级 | 欧美综合视频在线观看 | 国产精品欧美日韩 | 久久夜色精品国产欧美乱极品 | 免费a级在线观看播放 | 亚洲中久无码永久在线观看同 | 日日摸夜夜添夜夜爽免费视频 | 国产亚洲精品久久久性色情软件 | 中文字幕天天躁日日躁狠狠躁 | 小视频在线看 | 69成人做爰免费视频 | 亚洲综合网在线观看 | 美国免费毛片性视频 | 国产精品人成在线播放新网站 | 国产一二三区在线观看 | 四虎精品影院 | 久久综合九色综合97婷婷群聊 | 伊人色综合久久天天小片 | 久久99精品久久久久久水蜜桃 | 久久久青草 | 看一级特黄a大一片 | 夜夜爽一区二区三区精品 | 色欲aⅴ亚洲情无码av蜜桃 | 麻麻张开腿让我爽了一夜 | 亚洲国产成人av在线观看 | 日韩精品久久不卡中文字幕 | 天堂а√在线中文在线最新版 | 美女的隐私视频网站蜜桃视频 | 亚洲va久久久噜噜噜久久 | 一个综合色最更新快 | 人妻人人做人做人人爱 | 国产精品视频第一页 | 青春草在线视频观看 | 精品专区 | 黄色网页在线免费观看 | 国内久久久久影院精品 | 在线不卡一区 | 中文字幕无码乱码人妻系列蜜桃 | 国产精品久久久久久免费 |