From the book reviews:
It is recommended reading for academics with an interest in the area. Its secondary audience would be security professionals and software developers. This well-written book achieves its purposes--to describe the current state of research in the subject area and to outline directions for future research--quite well. (Neil D. Burgess, Computing Reviews, September, 2014)Cyberpatterns: Towards a Pattern Oriented Study of Cyberspace.- Towards a Conceptual Framework for Security Patterns.- Design Patterns: Applications and Open Issues.- Challenges For A Formal Framework for Patterns.- Design Space-Based Pattern Representation.- Extending AOP Principles for the Description of Network Security Patterns.- Management Patterns for Network Resilience: Design and Verification of Policy Configurations.- A Heuristic Approach for Secure Service Composition Adaptation.- A Strategy for Structuring and Formalising Attack Patterns.- Attack Pattern Recognition through Correlating Cyber Situational Awareness in Computer Networks.- Towards a Penetration Testing Framework using Attack Patterns.- On the use of Design Patterns to Capture Memory Corruption Vulnerabilities.- Weird Machine Patterns.- Towards a Simulation of Information Security Behaviour in Organisations.- Security Design Patterns in the MASTER Workbench.- Evaluating the Implications of Attack and Security Patterns with Premortems.- An Overview of Artificial Intelligence Based Pattern Matching in a Security and Digital Forensic Context.- Partitional Clustering of Malware using K-Means.- Dynamic Monitoring of Composed Services.- Where has this hard disk been? : Extracting geospatial intelligence from digital storage systems.- Future Directions for Research on Cyberpatterns.