International Journal of Business Information Systems
Improving SCADA control systems security with software vulnerability analysis
ACMOS'10 Proceedings of the 12th WSEAS international conference on Automatic control, modelling & simulation
Agile development with security engineering activities
Proceedings of the 2011 International Conference on Software and Systems Process
Hi-index | 0.00 |
Most organizations no longer take for granted that their deployed applications are secure. But even after conducting penetration tests, network and hosting security personnel spend considerable time chasing incidents. Your organization might be one of the many that have realized the "secure the perimeter" approach doesn't stem the tide of incidents because the software it's building and buying doesn't resist attack. A new approach offers help across the enterprise.