메뉴 건너뛰기




Volumn 4044 LNCS, Issue , 2006, Pages 154-163

Security planning and refactoring in extreme programming

Author keywords

[No Author keywords available]

Indexed keywords

PROJECT MANAGEMENT; SECURITY OF DATA; SOFTWARE ENGINEERING; WORLD WIDE WEB;

EID: 33746200049     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/11774129_16     Document Type: Conference Paper
Times cited : (13)

References (14)
  • 3
    • 84941160273 scopus 로고    scopus 로고
    • Fowler M., Refactoring, Addison-Wesley, 1999
    • Fowler M., Refactoring, Addison-Wesley, 1999.
  • 5
    • 29244456856 scopus 로고    scopus 로고
    • Extreme security engineering: On employing XP practices to achieve "good enough security" without defining it
    • ACM Press
    • Beznosov K., Extreme Security Engineering: On Employing XP Practices to Achieve "Good Enough Security" without defining it, The First ACM Workshop on business Driven Security Engineering (BizSec), ACM Press, 2003.
    • (2003) The First ACM Workshop on Business Driven Security Engineering (BizSec)
    • Beznosov, K.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.