This book constitutes the refereed proceedings of the 5th International Symposium on Unifying Theories of Programming, UTP 2014, held in Singapore, Singapore, in May 13, 2014, co-located with the 19th International Symposium on Formal Methods, FM 2014. The 7 revised full papers presented together with one invited talk were carefully reviewed and selected from 11 submissions. They deal with nume…
This book explains how to see one's own network through the eyes of an attacker, to understand their techniques and effectively protect against them. Through Python code samples the reader learns to code tools on subjects such as password sniffing, ARP poisoning, DNS spoofing, SQL injection, Google harvesting and Wifi hacking. Furthermore the reader will be introduced to defense methods such as…
This book comprehensively presents a novel approach to the systematic security hardening of software design models expressed in the standard UML language. It combines model-driven engineering and the aspect-oriented paradigm to integrate security practices into the early phases of the software development process. To this end, a UML profile has been developed for the specification of security h…
This open access book constitutes the proceedings of the 24th International Conference on Fundamental Approaches to Software Engineering, FASE 2021, which took place during March 27–April 1, 2021, and was held as part of the Joint Conferences on Theory and Practice of Software, ETAPS 2021. The conference was planned to take place in Luxembourg but changed to an online format due to the COVID-…
This book constitutes the thoroughly refereed conference proceedings of the Third International Workshop on Risk Assessment and Risk-driven Testing, RISK 2015, held in conjunction with the OMG Technical Meeting in Berlin, Germany, in June 2015. The revised 8 full papers were carefully reviewed and selected from 12 submissions. This workshop addresses systematic approaches that combine risk a…
This book constitutes the refereed proceedings of the 20th International Working Conference on Requirements Engineering: Foundation for Software Quality, REFSQ 2014, held in Essen, Germany, in April 2013. The 23 papers presented together with 1 keynote were carefully reviewed and selected from 62 submissions. The REFSQ'15 conference is organized as a three-day symposium. The REFSQ'15 has chosen…
This book constitutes the proceedings of the second Asia Pacific Requirements Engineering Symposium, APRES 2015, held in Wuhan, China, in October 2015. The 9 full papers presented together with 3 tool demos papers and one short paper, were carefully reviewed and selected from 18 submissions. The papers deal with various aspects of requirements engineering in the big data era, such as automat…
Computational experiments on algorithms can supplement theoretical analysis by showing what algorithms, implementations and speed-up methods work best for specific machines or problems. This book guides the reader through the nuts and bolts of the major experimental questions: What should I measure? What inputs should I test? How do I analyze the data? To answer these questions the book draws o…
This book is for musical makers and artists who want to gain knowledge and inspiration for your own amazing creations. “Grumpy Mike” Cook, co-author of several books on the Raspberry Pi and frequent answerer of questions of the Arduino forums, brings you a fun and instructive mix and simple and complex projects to help you understand how the Arduino can work with the MIDI system to create m…
This book constitutes the proceedings of the 28th International Conference on Architecture of Computing Systems, ARCS 2015, held in Porto, Portugal, in March 2015. The 19 papers presented together with three invited papers were carefully reviewed and selected from 45 submissions. The papers are organized in six sessions covering the topics: hardware, design, applications, trust and privacy, …