Sold Out
Book Categories |
Part I: Prologue: Introduction; Walk-through: Using UML for Security; Background.- Part II: Developing Secure Systems: Secure Systems Development; Applications.- Part III: Tool Support: Extending UML CASE Tools with Advanced Tools; A Formal Foundation; Formal Systems Development with UML.- Part IV: Epilogue: Further Material; Outlook.
Login|Complaints|Blog|Games|Digital Media|Souls|Obituary|Contact Us|FAQ
CAN'T FIND WHAT YOU'RE LOOKING FOR? CLICK HERE!!! X
You must be logged in to add to WishlistX
This item is in your Wish ListX
This item is in your CollectionSecure Systems Development with UML
X
This Item is in Your InventorySecure Systems Development with UML
X
You must be logged in to review the productsX
X
X
Add Secure Systems Development with UML, Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presen, Secure Systems Development with UML to the inventory that you are selling on WonderClubX
X
Add Secure Systems Development with UML, Attacks against computer systems can cause considerable economic or physical damage. High-quality development of security-critical systems is difficult, mainly because of the conflict between development costs and verifiable correctness. Jürjens presen, Secure Systems Development with UML to your collection on WonderClub |