<?xml version="1.0" encoding="utf-8"?>
<rss xmlns:dc="http://purl.org/dc/elements/1.1/" xmlns:content="http://purl.org/rss/1.0/modules/content/" xmlns:foaf="http://xmlns.com/foaf/0.1/" xmlns:og="http://ogp.me/ns#" xmlns:rdfs="http://www.w3.org/2000/01/rdf-schema#" xmlns:schema="http://schema.org/" xmlns:sioc="http://rdfs.org/sioc/ns#" xmlns:sioct="http://rdfs.org/sioc/types#" xmlns:skos="http://www.w3.org/2004/02/skos/core#" xmlns:xsd="http://www.w3.org/2001/XMLSchema#" version="2.0" xml:base="https://www.linuxjournal.com/tag/data-analytics">
  <channel>
    <title>Data Analytics</title>
    <link>https://www.linuxjournal.com/tag/data-analytics</link>
    <description/>
    <language>en</language>
    
    <item>
  <title>Lotfi ben Othmane, Martin Gilje Jaatun and Edgar Weippl's Empirical Research for Software Security (CRC Press)</title>
  <link>https://www.linuxjournal.com/content/lotfi-ben-othmane-martin-gilje-jaatun-and-edgar-weippls-empirical-research-software-security</link>
  <description>  &lt;div data-history-node-id="1339525" class="layout layout--onecol"&gt;
    &lt;div class="layout__region layout__region--content"&gt;
      
            &lt;div class="field field--name-field-node-image field--type-image field--label-hidden field--item"&gt;  &lt;img src="https://www.linuxjournal.com/sites/default/files/nodeimage/story/12237f5.jpg" width="379" height="600" alt="" typeof="foaf:Image" class="img-responsive" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-author field--type-ds field--label-hidden field--item"&gt;by &lt;a title="View user profile." href="https://www.linuxjournal.com/users/james-gray" lang="" about="https://www.linuxjournal.com/users/james-gray" typeof="schema:Person" property="schema:name" datatype="" xml:lang=""&gt;James Gray&lt;/a&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-body field--type-text-with-summary field--label-hidden field--item"&gt;&lt;p&gt;
Developing truly secure software is no walk through the park. In an effort to
apply the scientific method to the art of secure software development, a trio of
authors—Lotfi ben Othmane, Martin Gilje Jaatun and Edgar Weippl—teamed up to
write &lt;em&gt;Empirical Research for Software Security: Foundations and
Experience&lt;/em&gt;, which is published by &lt;a href="https://www.crcpress.com"&gt;CRC Press&lt;/a&gt;.
&lt;/p&gt;

&lt;p&gt;
The book is a guide for using empirical research methods to study
secure software challenges. Empirical methods, including data analytics, allow
extraction of knowledge and insights from the data that organizations gather from
their tools and processes, as well as from the opinions of the experts who
practice those methods and processes. These methods can be used to perfect a
secure software development lifecycle based on empirical data and published
industry best practices. 
&lt;/p&gt;

&lt;p&gt;
The book also features examples that illustrate the
application of data analytics in the context of secure software engineering.
&lt;/p&gt;
&lt;img src="http://www.linuxjournal.com/files/linuxjournal.com/ufiles/imagecache/large-550px-centered/u1000009/12237f5.jpg" alt="" title="" class="imagecache-large-550px-centered" /&gt;&lt;/div&gt;
      
            &lt;div class="field field--name-node-link field--type-ds field--label-hidden field--item"&gt;  &lt;a href="https://www.linuxjournal.com/content/lotfi-ben-othmane-martin-gilje-jaatun-and-edgar-weippls-empirical-research-software-security" hreflang="und"&gt;Go to Full Article&lt;/a&gt;
&lt;/div&gt;
      
    &lt;/div&gt;
  &lt;/div&gt;

</description>
  <pubDate>Fri, 20 Oct 2017 16:47:34 +0000</pubDate>
    <dc:creator>James Gray</dc:creator>
    <guid isPermaLink="false">1339525 at https://www.linuxjournal.com</guid>
    </item>

  </channel>
</rss>
