Writing Secure Code
Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++
Threat Modeling
IEEE Security and Privacy
Towards a structured unified process for software security
Proceedings of the 2006 international workshop on Software engineering for secure systems
Building security requirements using state transition diagram at security threat location
CIS'05 Proceedings of the 2005 international conference on Computational Intelligence and Security - Volume Part II
Mathematical and Computer Modelling: An International Journal
Hi-index | 0.00 |
In this installment, I draw on experiences gained as a member of Microsoft's central security team to outline some basic best practices you can implement in your software development process. These practices affected Microsoft products released since the inception of its Trustworthy Computing initiative in 2002.