free tracker

Secure And Resilient Software

Pub Date : 2011-11-10 | Author : Mark S. Merkow | Publisher : CRC Press

ISBN 10 : 9781466513167
ISBN 13 : 1466513160

Secure and Resilient Software: Requirements, Test Cases, and Testing Methods provides a comprehensive set of requirements for secure and resilient software development and operatio..


Secure And Resilient Software Development

Pub Date : 2015-09-15 | Author : Mark S. Merkow | Publisher : CRC Press

ISBN 10 : 9781498759618
ISBN 13 : 1498759610

Although many software books highlight open problems in secure software development, few provide easily actionable, ground-level solutions. Breaking the mold, Secure and Resilient ..


The 7 Qualities Of Highly Secure Software

Pub Date : 2012-07-02 | Author : Mano Paul | Publisher : CRC Press

ISBN 10 : 9781466566545
ISBN 13 : 146656654X

The 7 Qualities of Highly Secure Software provides a framework for designing, developing, and deploying hacker-resilient software. It uses engaging anecdotes and analogies—rangin..



Cyber Security Engineering

Pub Date : 2016-11-07 | Author : Nancy R. Mead | Publisher : Addison-Wesley Professional

ISBN 10 : 9780134189871
ISBN 13 : 0134189876

Cyber Security Engineering is the definitive modern reference and tutorial on the full range of capabilities associated with modern cyber security engineering. Pioneering software ..


Defending An Open Global Secure And Resilient Internet

Pub Date : 2013-06-01 | Author : Council on Foreign Relations | Publisher : Council on Foreign Relations

ISBN 10 : 9780876095591
ISBN 13 : 0876095597

The CFR-sponsored Independent Task Force report, Defending an Open, Global, Secure, and Resilient Internet, finds that as more people and services become interconnected and depende..


The Cert C Coding Standard

Pub Date : 2014 | Author : Robert C. Seacord | Publisher : Pearson Education

ISBN 10 : 9780321984043
ISBN 13 : 0321984048

The CERT C Coding Standard, Second Edition enumerates the coding errors that are the root causes of current software vulnerabilities in C, prioritizing them by severity, likelihood..