DPS: An Architectural Style for Development of Secure Software
InfraSec '02 Proceedings of the International Conference on Infrastructure Security
A dedicated undergraduate track in computer security education
Security education and critical infrastructures
An undergraduate track in computer security
Proceedings of the 8th annual conference on Innovation and technology in computer science education
Deriving security requirements from crosscutting threat descriptions
Proceedings of the 3rd international conference on Aspect-oriented software development
A cooperative agent-based model for active security systems
Journal of Network and Computer Applications
Integrating security across the computer science curriculum
Journal of Computing Sciences in Colleges
Matching attack patterns to security vulnerabilities in software-intensive system designs
SESS '05 Proceedings of the 2005 workshop on Software engineering for secure systems—building trustworthy applications
Security patterns and evolution of MTA architecture
OOPSLA '05 Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications
A threat-driven approach to modeling and verifying secure software
Proceedings of the 20th IEEE/ACM international Conference on Automated software engineering
A laboratory based capstone course in computer security for undergraduates
Proceedings of the 37th SIGCSE technical symposium on Computer science education
Extending XP practices to support security requirements engineering
Proceedings of the 2006 international workshop on Software engineering for secure systems
Towards agile security in web applications
Companion to the 21st ACM SIGPLAN symposium on Object-oriented programming systems, languages, and applications
On the Secure Software Development Process: CLASP and SDL Compared
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
An Analysis of the Security Patterns Landscape
SESS '07 Proceedings of the Third International Workshop on Software Engineering for Secure Systems
Evaluating the cost reduction of static code analysis for software security
Proceedings of the third ACM SIGPLAN workshop on Programming languages and analysis for security
Software Agents Action Securities
Computational Intelligence and Security
Security oriented program transformations (or how to add security on demand)
Companion to the 23rd ACM SIGPLAN conference on Object-oriented programming systems languages and applications
Systematically Eradicating Data Injection Attacks Using Security-Oriented Program Transformations
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
Toward Non-security Failures as a Predictor of Security Faults and Failures
ESSoS '09 Proceedings of the 1st International Symposium on Engineering Secure Software and Systems
On the secure software development process: CLASP, SDL and Touchpoints compared
Information and Software Technology
Security-oriented program transformations
Proceedings of the 5th Annual Workshop on Cyber Security and Information Intelligence Research: Cyber Security and Information Intelligence Challenges and Strategies
Torbit: Design of an open source security flaw measurement suite
Journal of Computational Methods in Sciences and Engineering
Software security analysis and assessment model for the web-based applications
Journal of Computational Methods in Sciences and Engineering
Research on software design level security vulnerabilities
ACM SIGSOFT Software Engineering Notes
Priority indexing model for evaluating and analysing organisations' information security systems
International Journal of Information Systems and Change Management
Moving from Requirements to Design Confronting Security Issues: A Case Study
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part II
Construction and application of network security defense model
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
Using semantic templates to study vulnerabilities recorded in large software repositories
Proceedings of the 2010 ICSE Workshop on Software Engineering for Secure Systems
Proceedings of the 16th Conference on Pattern Languages of Programs
SMARTCOP – a smart card based access control for the protection of network security components
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
Quantitative evaluation of systems with security patterns using a fuzzy approach
OTM'06 Proceedings of the 2006 international conference on On the Move to Meaningful Internet Systems: AWeSOMe, CAMS, COMINF, IS, KSinBIT, MIOS-CIAO, MONET - Volume Part I
OWA trees and their role in security modeling using attack trees
Information Sciences: an International Journal
Prioritizing countermeasures through the countermeasure method for software security (CM-Sec)
PROFES'10 Proceedings of the 11th international conference on Product-Focused Software Process Improvement
Growing a pattern language (for security)
Proceedings of the ACM international symposium on New ideas, new paradigms, and reflections on programming and software
Hi-index | 0.00 |
Building Secure Software cuts to the heart of computer security to help you get security right the first time. If you are serious about computer security, you need to read this book, which includes essential lessons for both security professionals who have come to realize that software is the problem, and software developers who intend to make their code behave. Written for anyone involved in software development and use---from managers to coders---this book is your first step toward building more secure software. Building Secure Software provides expert perspectives and techniques to help you ensure the security of essential software. If you consider threats and vulnerabilities early in the development cycle you can build security into your system. With this book you will learn how to determine an acceptable level of risk, develop security tests, and plug security holes before software is even shipped.Inside you'll find the ten guiding principles for software security, as well as detailed coverage of:* Software risk management for security* Selecting technologies to make your code more secure* Security implications of open source and proprietary software* How to audit software* The dreaded buffer overflow* Access control and password authentication* Random number generation* Applying cryptography* Trust management and input* Client-side security* Dealing with firewalls