Academic literature on the topic 'Computer software – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Computer software – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Computer software – Security measures"
Littlewood, Bev, Sarah Brocklehurst, Norman Fenton, et al. "Towards Operational Measures of Computer Security." Journal of Computer Security 2, no. 2-3 (1993): 211–29. http://dx.doi.org/10.3233/jcs-1993-22-308.
Full textKlevtsov, O., A. Symonov, and S. Trubchaninov. "Computer Security of NPP Instrumentation and Control Systems: Computer Security Assessment." Nuclear and Radiation Safety, no. 4(88) (December 11, 2020): 69–76. http://dx.doi.org/10.32918/nrs.2020.4(88).09.
Full textSun, Ning Ning, and Li Hua Ma. "Research and Maintenance of Computer Network Security." Applied Mechanics and Materials 687-691 (November 2014): 2431–34. http://dx.doi.org/10.4028/www.scientific.net/amm.687-691.2431.
Full textCourtney, Robert H. "Security Measures are Inherently Undesirable." EDPACS 13, no. 9 (1986): 9–12. http://dx.doi.org/10.1080/07366988609451204.
Full textVijayaraghavan, V., Sanjoy Paul, and N. Rajarathnam. "iMeasure Security (iMS): A Framework for Quantitative Assessment of Security Measures and its Impacts." Information Security Journal: A Global Perspective 19, no. 4 (2010): 213–25. http://dx.doi.org/10.1080/19393551003762223.
Full textAituganova, Zh T., B. A. Talpakova, and B. K. Zhussipbek. "EFFECTIVE WAYS TO INCREASE THE SECURITY OF STORING INFORMATION IN A DATABASE." BULLETIN Series of Physics & Mathematical Sciences 70, no. 2 (2020): 199–206. http://dx.doi.org/10.51889/2020-2.1728-7901.31.
Full textAziz, Israa T., and Ihsan H. Abdulqadder. "An Overview on SDN and NFV Security Orchestration in Cloud Network Environment." Cihan University-Erbil Scientific Journal 5, no. 1 (2021): 20–27. http://dx.doi.org/10.24086/cuesj.v5n1y2021.pp20-27.
Full textLiu, Rosina. "Is Security, is Audit, and Control Measures in Telecommunication Toll Fraud." EDPACS 25, no. 3 (1997): 1–11. http://dx.doi.org/10.1080/07366989709452320.
Full textBoutnaru, Shlomi, and Arnon Hershkovitz. "Software Quality and Security in Teachers' and Students' Codes When Learning a New Programming Language." Interdisciplinary Journal of e-Skills and Lifelong Learning 11 (2015): 123–47. http://dx.doi.org/10.28945/2292.
Full textA. D., Azernikov, Norkina A. N., Myseva E. R., and Chicherov K. A. "Innovative Technologies in Combating Cyber Crime." KnE Social Sciences 3, no. 2 (2018): 248. http://dx.doi.org/10.18502/kss.v3i2.1550.
Full textDissertations / Theses on the topic "Computer software – Security measures"
Allam, Sean. "A model to measure the maturuty of smartphone security at software consultancies." Thesis, University of Fort Hare, 2009. http://hdl.handle.net/10353/281.
Full textMonteiro, Valter. "How intrusion detection can improve software decoy applications." Thesis, Monterey, Calif. : Springfield, Va. : Naval Postgraduate School ; Available from National Technical Information Service, 2003. http://library.nps.navy.mil/uhtbin/hyperion-image/03Mar%5FMonteiro.pdf.
Full textColesky, Michael Robert. "SecMVC : a model for secure software design based on the model-view-controller pattern." Thesis, Nelson Mandela Metropolitan University, 2014. http://hdl.handle.net/10948/d1020614.
Full textMa, Chunyan. "Mathematical security models for multi-agent distributed systems." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2568.
Full textUr-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.
Full textKaiser, Edward Leo. "Addressing Automated Adversaries of Network Applications." PDXScholar, 2010. https://pdxscholar.library.pdx.edu/open_access_etds/4.
Full textVibhute, Tejaswini Ajay. "EPA-RIMM-V: Efficient Rootkit Detection for Virtualized Environments." PDXScholar, 2018. https://pdxscholar.library.pdx.edu/open_access_etds/4485.
Full textHughes, Grant Douglas. "A framework for software patch management in a multi-vendor environment." Thesis, Cape Peninsula University of Technology, 2016. http://hdl.handle.net/20.500.11838/2478.
Full textXuan, Chaoting. "Countering kernel malware in virtual execution environments." Diss., Atlanta, Ga. : Georgia Institute of Technology, 2009. http://hdl.handle.net/1853/31718.
Full textRansbotham, Samuel B. III. "Acquisition and diffusion of technology innovation." Diss., Georgia Institute of Technology, 2008. http://hdl.handle.net/1853/28094.
Full textBooks on the topic "Computer software – Security measures"
Manish, Chaitanya, ed. Architecting secure software systems. CRC Press/Taylor & Francis Group, 2008.
Find full textSinn, Richard. Software security technologies: A programmatic approach. Thomson/Course Technology, 2008.
Find full textAshbaugh, Douglas A. Security software development: Assessing and managing security risks. Auerbach Publications, 2008.
Find full text1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.
Find full textKhan, Khaled M. Security-aware systems applications and software development methods. Information Science Reference, 2012.
Find full textTakanen, Ari. Fuzzing for software security testing and quality assurance. Artech House, 2008.
Find full textGermany) NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 Marktoberdorf. Engineering dependable software systems. IOS Press, 2013.
Find full textOpen source security tools: Practical applications for security. Prentice Hall Professional Technical Reference, 2005.
Find full textPlatform security: Software development using the Symbian OS security architecture. Wiley, 2006.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textBook chapters on the topic "Computer software – Security measures"
Ganji, Daniel, Haralambos Mouratidis, Saeed Malekshahi Gheytassi, and Miltos Petridis. "Conflicts Between Security and Privacy Measures in Software Requirements Engineering." In Communications in Computer and Information Science. Springer International Publishing, 2015. http://dx.doi.org/10.1007/978-3-319-23276-8_29.
Full textJaatun, Martin Gilje. "Hunting for Aardvarks: Can Software Security Be Measured?" In Lecture Notes in Computer Science. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-32498-7_7.
Full textHunter, John M. D. "Software Security." In Computer Communications and Networks. Springer London, 2001. http://dx.doi.org/10.1007/978-1-4471-0261-8_10.
Full textHelfrich, James. "Computer Security." In Security for Software Engineers. Chapman and Hall/CRC, 2018. http://dx.doi.org/10.1201/9780429506475-2.
Full textPaladi, Nicolae, Linus Karlsson, and Khalid Elbashir. "Trust Anchors in Software Defined Networks." In Computer Security. Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98989-1_24.
Full textGeorgiopoulou, Zafeiroula, Eleni-Laskarina Makri, and Costas Lambrinoudakis. "GDPR Compliance: Proposed Technical and Organizational Measures for Cloud Providers." In Computer Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-42048-2_12.
Full textLevine, Diane E., John Mason, and Jennifer Hadley. "Software Development and Quality Assurance." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch39.
Full textScarfone, Karen, Peter Mell, and Murugiah Souppaya. "Managing Software Patches and Vulnerabilities." In Computer Security Handbook. John Wiley & Sons, Inc., 2015. http://dx.doi.org/10.1002/9781118851678.ch40.
Full textVoorhees, David P. "Software Design and Security." In Texts in Computer Science. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-28501-2_24.
Full textMichael, Mark. "Physical Security Threats and Measures." In Handbook of Computer Networks. John Wiley & Sons, Inc., 2012. http://dx.doi.org/10.1002/9781118256107.ch38.
Full textConference papers on the topic "Computer software – Security measures"
Yeng, Prosper, Bian Yang, and Einar Snekkenes. "Observational Measures for Effective Profiling of Healthcare Staffs' Security Practices." In 2019 IEEE 43rd Annual Computer Software and Applications Conference (COMPSAC). IEEE, 2019. http://dx.doi.org/10.1109/compsac.2019.10239.
Full textSaydjari, O. "Risk: A Good System Security Measure." In 30th Annual International Computer Software and Applications Conference (COMPSAC'06). IEEE, 2006. http://dx.doi.org/10.1109/compsac.2006.74.
Full text"Microarchitectures undo software security measures." In 2015 IEEE Hot Chips 27 Symposium (HCS). IEEE, 2015. http://dx.doi.org/10.1109/hotchips.2015.7477472.
Full textZheng, Xiaoxia. "Computer network security and measures." In Mechanical Engineering and Information Technology (EMEIT). IEEE, 2011. http://dx.doi.org/10.1109/emeit.2011.6023622.
Full textJing, Wang, Zhuang GuangLei, and Wang ZongChen. "Computer software engineering management measures." In 2011 IEEE 3rd International Conference on Communication Software and Networks (ICCSN). IEEE, 2011. http://dx.doi.org/10.1109/iccsn.2011.6013699.
Full textRöhl, Peter J., Raymond M. Kolonay, Michael J. Paradis, and Michael W. Bailey. "Intelligent Compressor Design in a Network-Centric Environment." In ASME 2001 International Design Engineering Technical Conferences and Computers and Information in Engineering Conference. American Society of Mechanical Engineers, 2001. http://dx.doi.org/10.1115/detc2001/cie-21667.
Full textTavares Coimbra, Rodrigo, Antonio Resende, and Ricardo Terra. "A Correlation Analysis between Halstead Complexity Measures and other Software Measures." In 2018 XLIV Latin American Computer Conference (CLEI). IEEE, 2018. http://dx.doi.org/10.1109/clei.2018.00014.
Full textMeng, Qingbao. "Computer Network Information Security and Protection Measures." In 2017 7th International Conference on Mechatronics, Computer and Education Informationization (MCEI 2017). Atlantis Press, 2017. http://dx.doi.org/10.2991/mcei-17.2017.193.
Full textBottino, Louis. "Security Measures in a Secure Computer Communications Architecture." In 2006 ieee/aiaa 25TH Digital Avionics Systems Conference. IEEE, 2006. http://dx.doi.org/10.1109/dasc.2006.313729.
Full textZhou, Enfeng. "On Computer Network Security Management and Technical Measures." In 2nd International Conference on Electronics, Network and Computer Engineering (ICENCE 2016). Atlantis Press, 2016. http://dx.doi.org/10.2991/icence-16.2016.37.
Full textReports on the topic "Computer software – Security measures"
Faculjak, D. A. Implementing security measures for computer-based security systems. Office of Scientific and Technical Information (OSTI), 1989. http://dx.doi.org/10.2172/6137987.
Full textBlack, Paul E., and Elizabeth N. Fong. Report of the Workshop on Software Measures and Metrics to Reduce Security Vulnerabilities (SwMM-RSV). National Institute of Standards and Technology, 2016. http://dx.doi.org/10.6028/nist.sp.500-320.
Full text