-
1
-
-
0002698747
-
Technical opinion: Information system security management in the new millennium
-
July
-
Dhillon, G., Backhouse, J. Technical opinion: Information system security management in the new millennium. Comm. ACM 43, 7, (July 2000), 125-128.
-
(2000)
Comm. ACM
, vol.43
, Issue.7
, pp. 125-128
-
-
Dhillon, G.1
Backhouse, J.2
-
2
-
-
33845933082
-
Increased security through open source
-
Jan.
-
Hoepman, J., Jacobs, B. Increased security through open source. Comm. ACM 50, 1, (Jan. 2007), 79-83.
-
(2007)
Comm. ACM
, vol.50
, Issue.1
, pp. 79-83
-
-
Hoepman, J.1
Jacobs, B.2
-
3
-
-
19944365247
-
th
-
New York, NY
-
Huang, Y., Yu, F., Hang, C., Tsai, C., Lee, D.T., Kuo, S. 2004. Securing Web application code static analysis and runtime protection. Proceedings of the 13th international conference on World Wide Web, New York, NY, 40-52.
-
(2004)
International Conference on World Wide Web
, pp. 40-52
-
-
Huang, Y.1
Yu, F.2
Hang, C.3
Tsai, C.4
Lee, D.T.5
Kuo, S.6
-
4
-
-
0000206310
-
Security models for Web-based applications
-
Feb.
-
Joshi, J.B.D., Aref, W.G., Ghafoor, A., Spafford, E.H. Security models for Web-based applications. Comm. ACM 44, 2, (Feb. 2001), 38-44.
-
(2001)
Comm. ACM
, vol.44
, Issue.2
, pp. 38-44
-
-
Joshi, J.B.D.1
Aref, W.G.2
Ghafoor, A.3
Spafford, E.H.4
-
5
-
-
85024250592
-
Commercializing open source software
-
Karels, M.J. Features: Commercializing open source software. Queue 1,5, (2003), 46-55.
-
(2003)
Queue
, vol.1
, Issue.5
, pp. 46-55
-
-
Karels, M.J.1
-
6
-
-
2442701031
-
2001. A model for information assurance: An integrated approach
-
June 5-6 West Point, NY
-
Maconachy, W.V., Schou, C.D., Ragsdale, D., Welch, D. 2001. A model for information assurance: An integrated approach. Proceedings of the 2001 IEEE Workshop on Information Assurance and Security, (June 5-6, 2001), West Point, NY: 306-310.
-
Proceedings of the 2001 IEEE Workshop on Information Assurance and Security
, vol.2001
, pp. 306-310
-
-
MacOnachy, W.V.1
Schou, C.D.2
Ragsdale, D.3
Welch, D.4
-
7
-
-
1642318725
-
Security in pervasive environments, What's next?
-
Mostefaoui, G.K. Security in pervasive environments, What's next? Security and Management Journal, 2003, 93-98.
-
(2003)
Security and Management Journal
, pp. 93-98
-
-
Mostefaoui, G.K.1
-
8
-
-
84869682102
-
-
PHP Security Guide 1.0.
-
PHP Security Consortium. PHP Security Guide 1.0. http://phpsec.org/ php-security-guide.pdf, 2005.
-
(2005)
PHP Security Consortium
-
-
-
9
-
-
0004198635
-
-
Prentice Hall, Upper Saddle River, NJ
-
Pfeeger, C. 1997. Security in Computing. Prentice Hall, Upper Saddle River, NJ, 1997.
-
(1997)
Security in Computing
, vol.1997
-
-
Pfeeger, C.1
-
10
-
-
33745811685
-
The essence of command injection attacks in Web applications
-
Charleston, SC
-
Su, Z., Wassermann, G. 2006. The essence of command injection attacks in Web applications. 33rd ACM SIGPLAN-SIGACT symposium on Principles of Programming Languages, Charleston, SC, 2006: 372-382.
-
(2006)
rd ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages
, pp. 372-382
-
-
Su, Z.1
Wassermann, G.2
-
11
-
-
25644437700
-
A performance comparison of dynamic Web technologies
-
Titchkosky, L., Arlitt, M., Williamson, C. A performance comparison of dynamic Web technologies. ACM SIGMETRICS Performance Evaluation Review 31, 3, (2003), 1-11.
-
(2003)
ACM SIGMETRICS Performance Evaluation Review
, vol.31
, Issue.3
, pp. 1-11
-
-
Titchkosky, L.1
Arlitt, M.2
Williamson, C.3
|