Empirical research for software security foundations and experience
Developing secure software requires the integration of numerous methods and tools into the development process, and software design is based on shared expert knowledge, claims, and opinions. This book introduces the reader to the fundamentals of empirical research methods, and demonstrates how these...
Saved in:
| Other Authors: | Ben Othmane, Lotfi (Editor), Jaatun, Martin Gilje (Editor), Weippl, Edgar R. (Editor) |
|---|---|
| Format: | Book |
| Language: | English |
| Published: |
Boca Raton, FL
CRC Press, Taylor & Francis Group
2018
|
| Series: | CRC series in security, privacy and trust
|
| Subjects: | |
| Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Software security building security in
by: McGraw, Gary, 1966-
Published: (2006)
by: McGraw, Gary, 1966-
Published: (2006)
Security and software for cybercafes
Published: (2008)
Published: (2008)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018)
by: Stallings, William, et al.
Published: (2018)
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)
by: Rhodes-Ousley, Mark
Published: (2013)
Computer Security Fundamentals
by: Easttom, Chuck
Published: (2020)
by: Easttom, Chuck
Published: (2020)
Computer and information security
Published: (2016)
Published: (2016)
Guide to network security
by: Whitman, Michael E., et al.
Published: (2013)
by: Whitman, Michael E., et al.
Published: (2013)
Security awareness applying practical security in your world
by: Ciampa
Published: (2004)
by: Ciampa
Published: (2004)
CompTIA Security + (Exam SY0-401)
by: Taylor, Pamela J., et al.
Published: (2014)
by: Taylor, Pamela J., et al.
Published: (2014)
Architecturing secure software systems
by: Talukderan, Asoke K.
Published: (2009)
by: Talukderan, Asoke K.
Published: (2009)
Computer security art and science
by: Bishop, Matt
Published: (2019)
by: Bishop, Matt
Published: (2019)
Computer security principles and practice
by: Stallings, William, et al.
Published: (2015)
by: Stallings, William, et al.
Published: (2015)
Information Security : Principles and Practice /
by: Stamp, Mark
Published: (2022)
by: Stamp, Mark
Published: (2022)
Computer security art and science
by: Bishop lhMatt
by: Bishop lhMatt
Computer security basics
by: Lehtinen, Rick
Published: (2006)
by: Lehtinen, Rick
Published: (2006)
Information security culture a human firewall approach
by: Omar Zakaria
Published: (2013)
by: Omar Zakaria
Published: (2013)
Computer and cyber security principles, algorithm, applications, and perspectives
Published: (2019)
Published: (2019)
Software test attacks to break mobile and embedded devices
by: Hagar, Jon Duncan
Published: (2017)
by: Hagar, Jon Duncan
Published: (2017)
The evolution of international security studies
by: Buzan, Barry, et al.
Published: (2009)
by: Buzan, Barry, et al.
Published: (2009)
Windows security monitoring scenarios and patterns
by: Miroshnikov, Andreĭ
Published: (2018)
by: Miroshnikov, Andreĭ
Published: (2018)
Data-Driven Security Analysis, Visualization and Dashboards
by: Jacobs, Jay
Published: (2014)
by: Jacobs, Jay
Published: (2014)
Designing security architecture solutions
by: Ramachandran, Jay
Published: (2002)
by: Ramachandran, Jay
Published: (2002)
Fundamentals of computer security technology
by: Amoroso
Published: (1994)
by: Amoroso
Published: (1994)
Wireshark for security professionals using Wireshark and the Metasploit Framework
by: Bullock, Jessey, et al.
Published: (2017)
by: Bullock, Jessey, et al.
Published: (2017)
Computer security literacy staying safe in a digital world
by: Jacobson, Douglas
Published: (2013)
by: Jacobson, Douglas
Published: (2013)
CCSP (ISC)2 certified cloud security professional official study guide
by: O'Hara, Brian T., et al.
Published: (2017)
by: O'Hara, Brian T., et al.
Published: (2017)
Information security architecture an integrated approach to security in the organization
by: Tudor, Jan Killmeyer
Published: (2006)
by: Tudor, Jan Killmeyer
Published: (2006)
Securing PHP Apps
by: Edmunds, Ben
Published: (2016)
by: Edmunds, Ben
Published: (2016)
Security management in mobile cloud computing
Published: (2017)
Published: (2017)
Information Security Risk Management for Iso27001/Iso 27002
by: Calder, Alan
Published: (2019)
by: Calder, Alan
Published: (2019)
Security software development assessing and managing security risks
by: Ashbaugh
Published: (2009)
by: Ashbaugh
Published: (2009)
Secure software development a security programmer's guide
by: Grembi, Jason
Published: (2008)
by: Grembi, Jason
Published: (2008)
Managing information security
Published: (2014)
Published: (2014)
Securing client/server computer networks
by: Davis
Published: (1996)
by: Davis
Published: (1996)
Computer communications security
by: Ford lhWarwick
by: Ford lhWarwick
Cyber security and IT infrastructure protection
Published: (2014)
Published: (2014)
Corporate computer security
by: Boyle, Randall, et al.
Published: (2015)
by: Boyle, Randall, et al.
Published: (2015)
MCSA/MCSE self-paced training kit (exam 70-350) implementing microsoft internet security and acceleration server 2004
by: Reimer, Stan, et al.
Published: (2005)
by: Reimer, Stan, et al.
Published: (2005)
Corporate computer and network security
by: Panko lhRaymond R
by: Panko lhRaymond R
Similar Items
-
Computer Security principles and practice
by: Stallings, William, et al.
Published: (2018) -
Software security building security in
by: McGraw, Gary, 1966-
Published: (2006) -
Security and software for cybercafes
Published: (2008) -
Computer security principles and practice
by: Stallings, William, et al.
Published: (2018) -
Information security the complete reference
by: Rhodes-Ousley, Mark
Published: (2013)


