Sciweavers

IEEESP
2006
55views more  IEEESP 2006»
13 years 11 months ago
Speaking of Privacy
Carl E. Landwehr
IEEESP
2006
68views more  IEEESP 2006»
13 years 11 months ago
Essential Factors for Successful Software Security Awareness Training
Kenneth R. van Wyk, John Steven
IEEESP
2006
50views more  IEEESP 2006»
13 years 11 months ago
RFID malware: truth vs. myth
Melanie R. Rieback, Bruno Crispo, Andrew S. Tanenb...
IEEESP
2006
47views more  IEEESP 2006»
13 years 11 months ago
Web services policies
Anne Anderson
IEEESP
2006
54views more  IEEESP 2006»
13 years 11 months ago
Weak Links, Strong Ties
George Cybenko
IEEESP
2006
42views more  IEEESP 2006»
13 years 11 months ago
Web application security engineering
J. D. Meier
IEEESP
2006
54views more  IEEESP 2006»
13 years 11 months ago
Putting the tools to work: how to succeed with source code analysis
Pravir Chandra, Brian Chess, John Steven
IEEESP
2006
108views more  IEEESP 2006»
13 years 11 months ago
Defining Misuse within the Development Process
abstraction a use case model offers makes it an appropriate startingpointforsoftwaresecurityanalysis and design activities. In contrast, a misuse case describes potential system be...
Gunnar Peterson, John Steven
IEEESP
2006
64views more  IEEESP 2006»
13 years 11 months ago
Desert Island Books
Eugene H. Spafford
IEEESP
2006
53views more  IEEESP 2006»
13 years 11 months ago
Fitting Square Pegs into Round Holes
Luther Martin