Security patch management
Saved in:
| Main Author: | Nicastro, Felicia M. |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton
CRC Press
c2011.
|
| Edition: | 2nd |
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Secure software development a security programmer's guide
by: Grembi, Jason
Published: (2008)
by: Grembi, Jason
Published: (2008)
Integrating security and software engineering advances and future visions
Published: (2007)
Published: (2007)
Security software development assessing and managing security risks
by: Ashbaugh
Published: (2009)
by: Ashbaugh
Published: (2009)
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008)
by: Zou, Xukai, 1963-
Published: (2008)
Year 2000 software testing
by: Perry, William
Published: (1999)
by: Perry, William
Published: (1999)
The best damn IT security management book period
Published: (2007)
Published: (2007)
A practical guide to managing information security
by: Purser, Steve
Published: (2004)
by: Purser, Steve
Published: (2004)
Software project management a process-driven approach
by: Ahmed, Ashfaque
Published: (2012)
by: Ahmed, Ashfaque
Published: (2012)
Countdown 2000 the Y2K challenge strategies,methodologies and solutions
by: Leon
Published: (1998)
by: Leon
Published: (1998)
Process-based software project management
by: Goodman
Published: (2006)
by: Goodman
Published: (2006)
Introduction to software project management and quality assurance
by: Ince, Darrel
Published: (1993)
by: Ince, Darrel
Published: (1993)
Web application vunerabilities Detect, exploit,prevent
by: Palmer
Published: (2007)
by: Palmer
Published: (2007)
Software engineering best practices lessons from successful projects in the top companies
by: Jones, Capers
Published: (2010)
by: Jones, Capers
Published: (2010)
The software vulnerability guide
by: Thompson
Published: (2005)
by: Thompson
Published: (2005)
Roadmap to information security for IT and InfoSec managers
by: Whitman, Michael E., 1964-
Published: (2011)
by: Whitman, Michael E., 1964-
Published: (2011)
The complete Y2K home preparation guide
by: Yourdon
Published: (1999)
by: Yourdon
Published: (1999)
Information technology security and risk management
by: Slay
Published: (2006)
by: Slay
Published: (2006)
Practical software maintenance best practices for managing your software investmenr
by: Pigoski
Published: (1997)
by: Pigoski
Published: (1997)
The basics of information security understanding the fundamentals of InfoSec in theory and practice
by: Andress, Jason
Published: (2011)
by: Andress, Jason
Published: (2011)
Hacker
Published: (2003)
Published: (2003)
Information security a strategic approach
by: LeVeque
Published: (2006)
by: LeVeque
Published: (2006)
Software security building security in
by: McGraw, Gary, 1966-
Published: (2006)
by: McGraw, Gary, 1966-
Published: (2006)
Endpoint Security
by: Kadrich
Published: (2007)
by: Kadrich
Published: (2007)
SQL injection attacks and defense
by: Clarke, Justin
Published: (2012)
by: Clarke, Justin
Published: (2012)
Verification validation and testing in software engineering
Published: (2007)
Published: (2007)
Computer security
by: Gollman
Published: (2006)
by: Gollman
Published: (2006)
Security awareness applying practical security in your world
by: Ciampa
Published: (2007)
by: Ciampa
Published: (2007)
Guide to high availability configuring boot/root/swap
by: KobertlhJeannie Johnstone
Published: (1999)
by: KobertlhJeannie Johnstone
Published: (1999)
Computer security principles and practice
by: Stallings, William
Published: (2008)
by: Stallings, William
Published: (2008)
How to break Web software functional and security testing of Web applications and Web services
by: Andrews, Mike
Published: (2006)
by: Andrews, Mike
Published: (2006)
Malware forensics field guide for Windows systems digital forensics field guides
by: Malin, Cameron H.
Published: (2012)
by: Malin, Cameron H.
Published: (2012)
Information security a practical approach
by: Bhaskar
Published: (2008)
by: Bhaskar
Published: (2008)
Information security management handbook
Published: (2012)
Published: (2012)
Information security management handbook
Published: (2007)
Published: (2007)
Computer Security Fundamentals /
by: Easttom, Chuck
Published: (2023)
by: Easttom, Chuck
Published: (2023)
Information security principles and practice
by: Stamp
Published: (2006)
by: Stamp
Published: (2006)
Introduction to computer security
by: Bishop, Matt (Matthew A.)
Published: (2005)
by: Bishop, Matt (Matthew A.)
Published: (2005)
Googling security : how much does Google know about you? /
by: Conti, Greg
Published: (2009)
by: Conti, Greg
Published: (2009)
Introduction to security and network forensics
by: Buchanan, William
Published: (2011)
by: Buchanan, William
Published: (2011)
Software metrics a practitioner's guide to improved product development
by: Moller, K.H. (Karl-Heinrich)
Published: (1993)
by: Moller, K.H. (Karl-Heinrich)
Published: (1993)
Similar Items
-
Secure software development a security programmer's guide
by: Grembi, Jason
Published: (2008) -
Integrating security and software engineering advances and future visions
Published: (2007) -
Security software development assessing and managing security risks
by: Ashbaugh
Published: (2009) -
Trust and security in collaborative computing
by: Zou, Xukai, 1963-
Published: (2008) -
Year 2000 software testing
by: Perry, William
Published: (1999)


