To see the other types of publications on this topic, follow the link: Computer software – Security measures.

Books on the topic 'Computer software – Security measures'

Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles

Select a source type:

Consult the top 50 books for your research on the topic 'Computer software – Security measures.'

Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.

You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.

Browse books on a wide variety of disciplines and organise your bibliography correctly.

1

Manish, Chaitanya, ed. Architecting secure software systems. CRC Press/Taylor & Francis Group, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
2

Sinn, Richard. Software security technologies: A programmatic approach. Thomson/Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
3

Ashbaugh, Douglas A. Security software development: Assessing and managing security risks. Auerbach Publications, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
4

1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
5

Khan, Khaled M. Security-aware systems applications and software development methods. Information Science Reference, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
6

Takanen, Ari. Fuzzing for software security testing and quality assurance. Artech House, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
7

Germany) NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 Marktoberdorf. Engineering dependable software systems. IOS Press, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
8

Open source security tools: Practical applications for security. Prentice Hall Professional Technical Reference, 2005.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
9

Platform security: Software development using the Symbian OS security architecture. Wiley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
10

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
11

Lehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
12

J, Noonan Wesley, ed. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRGT. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
13

Shibamouli, Lahiri, ed. Network and application security fundamentals and practices. Science Publishers, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
14

Germany) NATO Advanced Study Institute on Software Systems Safety (2013 Marktoberdorf. Software systems safety. IOS Press, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
15

L, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Course Technology, Cengage Learning, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
16

1960-, LeBlanc David, and Viega John, eds. 24 deadly sins of software security: Programming flaws and how to fix them. McGraw-Hill, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
17

Du, Dingzhu, Scott C. H. Huang, and David MacCallum. Network security. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
18

Parker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. Icon Group International, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
19

Lenny, Zeltser, ed. Malware: Fighting malicious code. Prentice Hall/PTR, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
20

Mitsu, Okada, and Satoh Ichiro, eds. Advances in computer science--Asian 2006: Secure software and related issues : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006 : revised selected papers. Springer, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
21

Security and policy driven computing. Taylor & Francis Group, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
22

Mike, Andrews, ed. How to break Web software: Functional and security testing of Web applications and Web services. Addison-Wesley, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
23

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
24

United States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. The Office, 2000.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
25

Christopher, Gerg, ed. Managing Security with Snort and IDS Tools. O'Reilly, 2004.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
26

Protecting games: A security handbook for game developers and publishers. Charles River Media/Course Technology, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
27

Seagren, Eric. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRTG. Edited by Noonan Wesley J. Syngress, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
28

W, Shinder Thomas, ed. Deploying Microsoft Forefront Protection 2010 for Exchange Server. Microsoft Press, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
29

1967-, Barthe Gilles, and Fournet Cédric, eds. Trustworthy global computing: Third symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007 : revised selected papers. Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
30

Supanto. Criminal policy: Memberantas pembajakan program komputer. Kerja Sama Lembaga Pengembangan Pendidikan (LPP) dan UPT Penerbitan dan Pencetakan UNS (UNS Press), Universitas Sebelas Maret Surakarta, 2011.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
31

Software Security Technologies. Course Technology, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
32

Chris, Wysopal, ed. The art of software security testing: Identifying software security flaws. Addison-Wesley, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
33

E, Adomi Esharenana, ed. Security and software for cybercafes. Information Science Reference, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
34

Dustin, Elfriede, Chris Wysopal, Lucas Nelson, and Dino Dai Zovi. The Art of Software Security Testing: Identifying Software Security Flaws (Symantec Press). Addison-Wesley Professional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
35

Cyber Security Engineering: A Practical Approach for Systems and Software Assurance (SEI Series in Software Engineering). Addison-Wesley Professional, 2016.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
36

Security Software Development: Assessing and Managing Security Risks. AUERBACH, 2010.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
37

Security Patterns in Practice Wiley Software Patterns. John Wiley & Sons, 2012.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
38

Dowd, Mark, Justin Schuh, and John McDonald. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
39

H, Allen Julia, ed. Software security engineering: A guide for project managers. Addison-Wesley, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
40

Khan, Khaled M. Developing and evaluating security-aware software systems. 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
41

Applied Information Security: A Hands-On Guide to Information Security Software. Pearson Education, Limited, 2013.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
42

Threat modeling: Designing for security. Wiley, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
43

Shostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
44

Shostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
45

McGraw, Gary, and Greg Hoglund. Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
46

McGraw, Gary, and Greg Hoglund. Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
47

Levy, Elias. Software Vulnerabilities: Identifying, Avoiding, and Mitigating Exploits. Pearson Education, Limited, 2006.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
48

Kriha, Walter, and Roland Schmitz. Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche (Xpert.press). Springer, 2008.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
49

National Academies of Sciences, Engineering, and Medicine. Software Update As a Mechanism for Resilience and Security: Proceedings of a Workshop. National Academies Press, 2017.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
50

Raven, Alder, ed. How to cheat at configuring Open Source security tools. Syngress, 2007.

Find full text
APA, Harvard, Vancouver, ISO, and other styles
We offer discounts on all premium plans for authors whose works are included in thematic literature selections. Contact us to get a unique promo code!