-
2
-
-
14744271696
-
Software Penetration Testing
-
Arkin, B., Stender, S., McGraw, G., "Software Penetration Testing," IEEE Security & Privacy 3 (1), 2005, pp.84-87.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 84-87
-
-
Arkin, B.1
Stender, S.2
McGraw, G.3
-
3
-
-
35048891521
-
-
Generally Accepted Privacy Prinicples (n.d.) Available at: http://infotech.aicpa.org/Resources/Privacy/Ge nerally+Accepted+Privacy+Principles/Generall y+Accepted+Privacy+Principles/
-
Generally Accepted Privacy Prinicples (n.d.) Available at: http://infotech.aicpa.org/Resources/Privacy/Ge nerally+Accepted+Privacy+Principles/Generall y+Accepted+Privacy+Principles/
-
-
-
-
5
-
-
35048857376
-
-
access with XACML. Available at
-
Manisha, V., (2004). XML Security: Control information access with XACML. Available at: http://www-128.ibm.com/developerworks /xml/library/x-xacml/
-
(2004)
XML Security: Control information
-
-
Manisha, V.1
-
6
-
-
0034269416
-
Attacking Malicious Code
-
September/October
-
McGraw, G., Morrisett, G., "Attacking Malicious Code," IEEE Software 17 (5), September/October 2000, pp.33-41.
-
(2000)
IEEE Software
, vol.17
, Issue.5
, pp. 33-41
-
-
McGraw, G.1
Morrisett, G.2
-
7
-
-
24344437348
-
A Portal for Software Security
-
Mead, N., McGraw, G., "A Portal for Software Security," IEEE Security & Privacy 3 (4), 2005, pp.75-79.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.4
, pp. 75-79
-
-
Mead, N.1
McGraw, G.2
-
8
-
-
35048839063
-
-
Notice and Spyware
-
Nathaniel Good, Rachna Dhamija, Jens Grossklagsl, David Thaw, Steven Aronowitz, Deirdre Mulligan and Joseph Konstan (2005). Stopping Spyware at the Gate: A User Study of Privacy, Notice and Spyware.
-
(2005)
Stopping Spyware at the Gate: A User Study of Privacy
-
-
Good, N.1
Dhamija, R.2
Grossklagsl, J.3
Thaw, D.4
Aronowitz, S.5
Mulligan, D.6
Konstan, J.7
-
9
-
-
35048880626
-
-
Available at
-
Phil, G., (2002). Introduction to XACML. Available at: http://dev2dev.bea.com/pub/a/2004/02/xacml.h tml
-
(2002)
Introduction to XACML
-
-
Phil, G.1
-
10
-
-
35048877635
-
-
Privacy Management Council. Available at
-
Privacy Management Council. Available at: http://www306.ibm.com/ software/tivoli/products/privacy-mgr-e-bus/privacycouncil.html
-
-
-
-
11
-
-
35048849939
-
-
Available at
-
Remy, D., (2003). Building Secure Web Services. Available at: http://www.orlandojug.org/1104_secure_webse rvices.pdf
-
(2003)
Building Secure Web Services
-
-
Remy, D.1
-
12
-
-
35048886045
-
-
Available at
-
Secure Web Services (2002). Available at: http://www.javaworld.com/ javaworld/jw-03-2003/jw-0321-wssecurity-p2.html
-
(2002)
Secure Web Services
-
-
-
13
-
-
35048842268
-
-
Available at
-
Shah, M., (2004). Web Services Interoperability. Available at: http://www.c- sharpcorner.com/Code/2004/Aug/WSInterop.a sp
-
(2004)
Web Services Interoperability
-
-
Shah, M.1
-
14
-
-
35048821481
-
-
executive Summary. Available at
-
Shirky, C., (2002). Web Service: An executive Summary. Available at: http://webservices.xml.com/pub/a/ws/2002/04/ 12/execreport.html
-
(2002)
Web Service: An
-
-
Shirky, C.1
-
16
-
-
2642549597
-
-
Available at
-
Siddigui, B., (2003). Web Services Security. Available at: http://webservices.xml.com/pub/a/ws/2003/03/ 04/security.html
-
(2003)
Web Services Security
-
-
Siddigui, B.1
-
17
-
-
35048853063
-
-
Available at
-
SOAP Tutorial, (n. d). Available at: http://www.w3schools.com/soap/ default.asp
-
SOAP Tutorial, (n. d)
-
-
-
18
-
-
35048896479
-
-
SOAP:, Available at
-
SOAP: Simple Object Access Protocol. (2005). Available at: http://static.userland.com/xmlRpcCom/soap/S OAPv11.htm
-
(2005)
Simple Object Access Protocol
-
-
-
19
-
-
35048894368
-
-
Available at
-
Spyware Warrior, (n. d). Available at: http://www.spywarewarrior.com/ rogue_antispyware.htm
-
Spyware Warrior, (n. d)
-
-
-
21
-
-
2942698676
-
-
Gateway. Available at
-
Venkatapathy, C., (2002). An Introduction to Web Services Gateway. Available at: http://www-106.ibm.com/developerworks/webservices/libr ary/ws-gateway/
-
(2002)
An Introduction to Web Services
-
-
Venkatapathy, C.1
-
22
-
-
0003925663
-
-
Addison-Wesley, Boston, MA
-
Viega, J., McGraw, G., Building Secure Software: How to Avoid Security Problems the Right Way, Addison-Wesley, Boston, MA, 2001.
-
(2001)
Building Secure Software: How to Avoid Security Problems the Right Way
-
-
Viega, J.1
McGraw, G.2
|