-
3
-
-
14744271048
-
Application penetration testing
-
Jan.-Feb.
-
H.H. Thompson, "Application penetration testing, " IEEE Security & Privacy, vol. 3, no. 1, p. 66, Jan.-Feb. 2005.
-
(2005)
IEEE Security & Privacy
, vol.3
, Issue.1
, pp. 66
-
-
Thompson, H.H.1
-
4
-
-
84877922658
-
Web application security: Automated scanning versus manual penetration testing
-
IBM
-
D Allan, "Web application security: automated scanning versus manual penetration testing, " IBM Rational Software, Somers, White Paper 2008.
-
(2008)
Rational Software, Somers, White Paper
-
-
Allan, D.1
-
5
-
-
10944267118
-
Static analysis for security
-
Novemeber - December
-
B. Chess and G. McGraw, "Static Analysis for Security, " IEEE Security and Privacy, vol. 2, no. 6, pp. 76-79, Novemeber - December 2004.
-
(2004)
IEEE Security and Privacy
, vol.2
, Issue.6
, pp. 76-79
-
-
Chess, B.1
Mcgraw, G.2
-
6
-
-
14544301479
-
Finding bugs is easy
-
December
-
W. Pugh and D. Hovemeyer, "Finding bugs is easy, " ACM SIGPLAN Notices, vol. 39, no. 12, December 2004.
-
(2004)
ACM SIGPLAN Notices
, vol.39
, Issue.12
-
-
Pugh, W.1
Hovemeyer, D.2
-
7
-
-
50549091105
-
Using static analysis to find bugs
-
Sept.-Oct.
-
N. Ayewah, D. Hovemeyer, J.D. Morgenthaler, J. Penix, and W. Pugh, "Using Static Analysis to Find Bugs, " IEEE Software, vol. 25, no. 5, pp. 22-29, Sept.-Oct 2008.
-
(2008)
IEEE Software
, vol.25
, Issue.5
, pp. 22-29
-
-
Ayewah, N.1
Hovemeyer, D.2
Morgenthaler, J.D.3
Penix, J.4
Pugh, W.5
-
8
-
-
35248827669
-
Software verification with BLAST
-
Springer-Verlag, Berlin, Heidelberg
-
T. Henzinger, R. Jhala, R. Majumdar, and G Sutre, "Software verification with BLAST, " in Proceedings of the 10th international conference on Model checking software (SPIN'03), Springer-Verlag, Berlin, Heidelberg, 2003, pp. 235-239.
-
(2003)
Proceedings of the 10th International Conference on Model Checking Software (SPIN'03)
, pp. 235-239
-
-
Henzinger, T.1
Jhala, R.2
Majumdar, R.3
Sutre, G.4
-
9
-
-
77955205925
-
-
(August) HttpOnly. [Online]
-
The Open Web Application Security Project. (2010, August) HttpOnly. [Online]. http://www.owasp.org/index.php/HttpOnly.
-
(2010)
The Open Web Application Security Project
-
-
-
10
-
-
36348977135
-
-
(March), [Online
-
The MITRE Corporation. (2011, March) Common Weakness Enumeration. [Online]. http://cwe.mitre.org/.
-
(2011)
Common Weakness Enumeration
-
-
-
11
-
-
77649285593
-
Comparing the effectiveness of penetration testing and static code analysis on the detection of sql injection vulnerabilities in web services
-
Shanghai
-
N. Antunes and M. Vieira, "Comparing the Effectiveness of Penetration Testing and Static Code Analysis on the Detection of SQL Injection Vulnerabilities in Web Services, " in 15th IEEE Pacific Rim International Symposium on Dependable Computing, Shanghai, 2009, p. 301.
-
(2009)
15th IEEE Pacific Rim International Symposium on Dependable Computing
, pp. 301
-
-
Antunes, N.1
Vieira, M.2
-
15
-
-
70349667605
-
Static code analysis to detect software security vulnerabilities -does experience matter?
-
Fukuoka
-
D. Baca, K. Petersen, B. Carlsson, and L. Lundberg, "Static Code Analysis to Detect Software Security Vulnerabilities -Does Experience Matter?, " in International Conference on Availability, Reliability and Security (ARES '09), Fukuoka, 2009, p. 804.
-
(2009)
International Conference on Availability, Reliability and Security (ARES '09)
, pp. 804
-
-
Baca, D.1
Petersen, K.2
Carlsson, B.3
Lundberg, L.4
-
16
-
-
16244364044
-
A comparison of bug finding tools for Java
-
Saint-Malo
-
N. Rutar, C.B. Almazan, and J.S. Foster, "A comparison of bug finding tools for Java, " in 15th International Symposium on Software Reliability Engineering, Saint-Malo, 2004, pp. 245-256.
-
(2004)
15th International Symposium on Software Reliability Engineering
, pp. 245-256
-
-
Rutar, N.1
Almazan, C.B.2
Foster, J.S.3
-
17
-
-
84855469614
-
-
(January), [Online]
-
G. McGraw and J. Steven. (2011, January) informIT. [Online]. http://www.informit.com/articles/article.aspx?p=1680863.
-
(2011)
InformIT
-
-
Mcgraw, G.1
Steven, J.2
-
18
-
-
84948991207
-
Penetration testing: A duet
-
Las Vegas
-
D. Geer and J. Harthorne, "Penetration testing: a duet, " in 18th Annual Computer Security Applications Conference, 2002, Las Vegas, 2002, p. 185.
-
(2002)
18th Annual Computer Security Applications Conference, 2002
, pp. 185
-
-
Geer, D.1
Harthorne, J.2
-
20
-
-
84855446756
-
-
OEMR.ORG. (February), [Online]
-
OEMR.ORG. (2011, February) OpenEMR Commercial Help. [Online]. http://www.openmedsoftware.org/wiki/OpenEMR-Commercial-Help.
-
(2011)
OpenEMR Commercial Help
-
-
-
22
-
-
80052388280
-
Challenges for protecting the privacy of health information: Required certification can leave common vulnerabilities undetected
-
Chicago
-
B. Smith et al., "Challenges for Protecting the Privacy of Health Information: Required Certification Can Leave Common Vulnerabilities Undetected, " in Security and Privacy in Medical and Home-care Systems (SPIMACS 2010) Workshop, Chicago, 2010, pp. 1-12.
-
(2010)
Security and Privacy in Medical and Home-care Systems (SPIMACS 2010) Workshop
, pp. 1-12
-
-
Smith, B.1
-
23
-
-
84855440241
-
-
(September), [Online
-
S. Barnum and M. Gegick. (September, 2005) Defense in Depth. [Online]. https://buildsecurityin.us-cert.gov/bsi/articles/knowledge/principles/347-BSI. html.
-
(2005)
Defense in Depth
-
-
Barnum, S.1
Gegick, M.2
|