-
1
-
-
33847027959
-
The Bugs Stop Here
-
Berinato, S., The Bugs Stop Here, in CIO. 2003
-
(2003)
CIO
-
-
Berinato, S.1
-
2
-
-
34250639317
-
-
The Global State of Information Security
-
Berinato, S., Global Security, The Global State of Information Security 2005. 13/10/2005. http://www.cio.com/archive/091505/global.html
-
(2005)
Global Security
, pp. 13-10
-
-
Berinato, S.1
-
3
-
-
34250635802
-
Global Security Survey. 2005
-
London, p
-
Deloitte, 2005 Global Security Survey. 2005, Deloitte Touché Tohmatsu: London, p. 1-44.
-
(2005)
Deloitte Touché Tohmatsu
, pp. 1-44
-
-
Deloitte1
-
4
-
-
1542387560
-
-
Journal of Web Engineering, 1No. 1, p
-
Deshpande, Y., Murugesan, S., Ginige, A., Hansen, S., Schwabe, D., Gaedke, M. and White, B., Web Engineering. Journal of Web Engineering, 2002. 1(No. 1): p. 3-17.
-
(2002)
Web Engineering
, pp. 3-17
-
-
Deshpande, Y.1
Murugesan, S.2
Ginige, A.3
Hansen, S.4
Schwabe, D.5
Gaedke, M.6
White, B.7
-
6
-
-
34250643869
-
-
Exler, R., Security and the Application Development Process. 22/01/2006. http://www.csoonline.com/analyst/report3068.html
-
Exler, R., Security and the Application Development Process. 22/01/2006. http://www.csoonline.com/analyst/report3068.html
-
-
-
-
8
-
-
33847079274
-
Web Development Evolution: The Assimilation of Web Engineering Security
-
Buenos Aires, Argentina: IEEE CS Press
-
Glisson, W. B. and Weiland, R. Web Development Evolution: The Assimilation of Web Engineering Security. in 3rd Latin American Web Congress. 2005. Buenos Aires - Argentina: IEEE CS Press.
-
(2005)
3rd Latin American Web Congress
-
-
Glisson, W.B.1
Weiland, R.2
-
11
-
-
3242808612
-
-
Computer Security Institute, p
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W. and Richardson, R., 2004 CSI/FBI Computer Crime Security Survey. 2004, Computer Security Institute, p. 2-18.
-
(2004)
2004 CSI/FBI Computer Crime Security Survey
, pp. 2-18
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
12
-
-
24344440328
-
CSI/FBIComputer Crime Survey
-
Computer Security Institute, p
-
Gordon, L. A., Loeb, M. P., Lucyshyn, W. and Richardson, R., 2005 CSI/FBIComputer Crime Survey, in Tenth Annual. 2005, Computer Security Institute, p. 1-25.
-
(2005)
Tenth Annual
, pp. 1-25
-
-
Gordon, L.A.1
Loeb, M.P.2
Lucyshyn, W.3
Richardson, R.4
-
14
-
-
34250686519
-
Policy Development
-
Tipton, H.F. and Krause, M, eds, Auerbach Publications: Boca Raton, p
-
Hare, C., Policy Development, in Information Security Managment Handbook, Tipton, H.F. and Krause, M., (eds). 2004. Auerbach Publications: Boca Raton, p. 925-943.
-
(2004)
Information Security Managment Handbook
, pp. 925-943
-
-
Hare, C.1
-
15
-
-
34250675982
-
A Matter of Trust
-
Krause, H.F.T.a.M, ed, Auerbach Publications: Boca Raton
-
Kaplan, R., A Matter of Trust, in Information Security Managment Handbook, Krause, H.F.T.a.M., (ed). 2004, Auerbach Publications: Boca Raton.
-
(2004)
Information Security Managment Handbook
-
-
Kaplan, R.1
-
17
-
-
33847326664
-
-
Ph.D. Thesis, in Department of Computing Science, University of Glasgow: Glasgow
-
Mcdonald, A., The Agile Web Engineering (AWE) Process, Ph.D. Thesis, in Department of Computing Science. 2004, University of Glasgow: Glasgow.
-
(2004)
The Agile Web Engineering (AWE) Process
-
-
Mcdonald, A.1
-
18
-
-
34250689422
-
Agile Web Engineering (A WE) Process: Perceptions within a Fortune 500 Financial Services Company
-
McDonald, A. and Weiland, R., Agile Web Engineering (A WE) Process: Perceptions within a Fortune 500 Financial Services Company. Journal of Web Engineering, 2005. 4(4): p. 283-312.
-
(2005)
Journal of Web Engineering
, vol.4
, Issue.4
, pp. 283-312
-
-
McDonald, A.1
Weiland, R.2
-
20
-
-
34250657676
-
-
Mimoso, M. S., Top Web application security problems identified SearchSecurity.com. April 12, 2005. http://searchsecurity.techtarget.com/ originalContent/0,289142,sid14-_gci873823,00.html?NewsEL=9.25
-
Mimoso, M. S., Top Web application security problems identified SearchSecurity.com. April 12, 2005. http://searchsecurity.techtarget.com/ originalContent/0,289142,sid14-_gci873823,00.html?NewsEL=9.25
-
-
-
-
22
-
-
33847063460
-
-
Organization for Internet Safety
-
Organization for Internet Safety, Guidelines for Security Vulnerability Reporting and Response. http://www.oisafety.org/guidelines/ Guidelines%20for%20Security%20Vulnerability%20Reporting%20and%20Response%20V2.0. pdf
-
Guidelines for Security Vulnerability Reporting and Response
-
-
-
24
-
-
2542492057
-
-
Systems Security Engineering Capability Maturity Model (SSE-CMM) Project, Carnegie Mellon University: Pennsylvania, p
-
Systems Security Engineering Capability Maturity Model (SSE-CMM) Project, Systems Security Engineering -Capability Maturity Model (SSE-CMM) Model Description Document. 2003, Carnegie Mellon University: Pennsylvania, p. 1-340.
-
(2003)
Systems Security Engineering -Capability Maturity Model (SSE-CMM) Model Description Document
, pp. 1-340
-
-
-
25
-
-
20844451793
-
Adopting a software security improvement program
-
Taylor, D. and McGraw, G., Adopting a software security improvement program, in IEEE Security & Privacy. 2005. p. 88-91.
-
(2005)
IEEE Security & Privacy
, pp. 88-91
-
-
Taylor, D.1
McGraw, G.2
-
26
-
-
0032074438
-
Experimental Models for Validating Technology
-
Zelkowitz, M. V. and Wallace, D. R., Experimental Models for Validating Technology. IEEE Computer, 1998. 31(5): p. 23-31.
-
(1998)
IEEE Computer
, vol.31
, Issue.5
, pp. 23-31
-
-
Zelkowitz, M.V.1
Wallace, D.R.2
|