Comparing observed bug and productivity rates for Java and C++
Software—Practice & Experience
Secrets & Lies: Digital Security in a Networked World
Secrets & Lies: Digital Security in a Networked World
Handbook of Applied Cryptography
Handbook of Applied Cryptography
Writing Secure Code
UMLsec: Extending UML for Secure Systems Development
UML '02 Proceedings of the 5th International Conference on The Unified Modeling Language
Software Security for Open-Source Systems
IEEE Security and Privacy
Why Secure Applications Are Difficult to Write
IEEE Security and Privacy
Practical Cryptography
Secure Coding: Principles and Practices
Secure Coding: Principles and Practices
IEEE Security and Privacy
Secure Programming Cookbook for C and C++
Secure Programming Cookbook for C and C++
Exploiting Software: How to Break Code
Exploiting Software: How to Break Code
InfoSecCD '06 Proceedings of the 3rd annual conference on Information security curriculum development
Model-Based Security Engineering of Distributed Information Systems Using UMLsec
ICSE '07 Proceedings of the 29th international conference on Software Engineering
Model-based security analysis for mobile communications
Proceedings of the 30th international conference on Software engineering
An experimental environment for teaching Java security
Proceedings of the 6th international symposium on Principles and practice of programming in Java
Guidelines for secure software development
Proceedings of the 2008 annual research conference of the South African Institute of Computer Scientists and Information Technologists on IT research in developing countries: riding the wave of technology
Proceedings of the 4th International Conference on Design Science Research in Information Systems and Technology
Proceedings of the Second International Conference on Computational Science, Engineering and Information Technology
Survey and analysis on Security Requirements Engineering
Computers and Electrical Engineering
Hi-index | 0.00 |
When trying to incorporate security into a program, software developers face either too much theoretical information that they can't apply or exhaustive and discouraging recommendation lists. This article gives an overview of security concerns at each step of a project's life cycle.