Books on the topic 'Computer software – Security measures'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 books for your research on the topic 'Computer software – Security measures.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse books on a wide variety of disciplines and organise your bibliography correctly.
Manish, Chaitanya, ed. Architecting secure software systems. CRC Press/Taylor & Francis Group, 2008.
Find full textSinn, Richard. Software security technologies: A programmatic approach. Thomson/Course Technology, 2008.
Find full textAshbaugh, Douglas A. Security software development: Assessing and managing security risks. Auerbach Publications, 2008.
Find full text1977-, McDonald John, and Schuh Justin, eds. The art of software security assessment: Identifying and preventing software vulnerabilities. Addison-Wesley, 2007.
Find full textKhan, Khaled M. Security-aware systems applications and software development methods. Information Science Reference, 2012.
Find full textTakanen, Ari. Fuzzing for software security testing and quality assurance. Artech House, 2008.
Find full textGermany) NATO Advanced Study Institute on Engineering Dependable Software Systems (2012 Marktoberdorf. Engineering dependable software systems. IOS Press, 2013.
Find full textOpen source security tools: Practical applications for security. Prentice Hall Professional Technical Reference, 2005.
Find full textPlatform security: Software development using the Symbian OS security architecture. Wiley, 2006.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textLehnert, Volker. Authorizations in SAP software: Design and configuration. Galileo Press, 2010.
Find full textJ, Noonan Wesley, ed. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRGT. Syngress, 2007.
Find full textShibamouli, Lahiri, ed. Network and application security fundamentals and practices. Science Publishers, 2011.
Find full textGermany) NATO Advanced Study Institute on Software Systems Safety (2013 Marktoberdorf. Software systems safety. IOS Press, 2014.
Find full textL, Antonakos James, ed. Computer networking from LANs to WANs: Hardware, software and security. Course Technology, Cengage Learning, 2010.
Find full text1960-, LeBlanc David, and Viega John, eds. 24 deadly sins of software security: Programming flaws and how to fix them. McGraw-Hill, 2010.
Find full textDu, Dingzhu, Scott C. H. Huang, and David MacCallum. Network security. Springer, 2007.
Find full textParker, Philip M. Information technology (IT) security software in Hong Kong: A strategic reference, 2006. Icon Group International, 2007.
Find full textMitsu, Okada, and Satoh Ichiro, eds. Advances in computer science--Asian 2006: Secure software and related issues : 11th Asian Computing Science Conference, Tokyo, Japan, December 6-8, 2006 : revised selected papers. Springer, 2007.
Find full textMike, Andrews, ed. How to break Web software: Functional and security testing of Web applications and Web services. Addison-Wesley, 2006.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. The Office, 2000.
Find full textUnited States. General Accounting Office. Accounting and Information Management Division. Information security: Software change controls at the Social Security Administration. The Office, 2000.
Find full textChristopher, Gerg, ed. Managing Security with Snort and IDS Tools. O'Reilly, 2004.
Find full textProtecting games: A security handbook for game developers and publishers. Charles River Media/Course Technology, 2008.
Find full textSeagren, Eric. Secure your network for free: Using Nmap, Wireshark, Snort, Nessus, and MRTG. Edited by Noonan Wesley J. Syngress, 2006.
Find full textW, Shinder Thomas, ed. Deploying Microsoft Forefront Protection 2010 for Exchange Server. Microsoft Press, 2010.
Find full text1967-, Barthe Gilles, and Fournet Cédric, eds. Trustworthy global computing: Third symposium, TGC 2007, Sophia-Antipolis, France, November 5-6, 2007 : revised selected papers. Springer, 2008.
Find full textSupanto. Criminal policy: Memberantas pembajakan program komputer. Kerja Sama Lembaga Pengembangan Pendidikan (LPP) dan UPT Penerbitan dan Pencetakan UNS (UNS Press), Universitas Sebelas Maret Surakarta, 2011.
Find full textChris, Wysopal, ed. The art of software security testing: Identifying software security flaws. Addison-Wesley, 2007.
Find full textE, Adomi Esharenana, ed. Security and software for cybercafes. Information Science Reference, 2008.
Find full textDustin, Elfriede, Chris Wysopal, Lucas Nelson, and Dino Dai Zovi. The Art of Software Security Testing: Identifying Software Security Flaws (Symantec Press). Addison-Wesley Professional, 2006.
Find full textCyber Security Engineering: A Practical Approach for Systems and Software Assurance (SEI Series in Software Engineering). Addison-Wesley Professional, 2016.
Find full textSecurity Software Development: Assessing and Managing Security Risks. AUERBACH, 2010.
Find full textDowd, Mark, Justin Schuh, and John McDonald. The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities. Addison-Wesley Professional, 2006.
Find full textH, Allen Julia, ed. Software security engineering: A guide for project managers. Addison-Wesley, 2008.
Find full textApplied Information Security: A Hands-On Guide to Information Security Software. Pearson Education, Limited, 2013.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textShostack, Adam. Threat Modeling: Designing for Security. Wiley & Sons, Incorporated, John, 2014.
Find full textMcGraw, Gary, and Greg Hoglund. Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2007.
Find full textMcGraw, Gary, and Greg Hoglund. Exploiting Online Games: Cheating Massively Distributed Systems (Addison-Wesley Software Security Series). Addison-Wesley Professional, 2007.
Find full textLevy, Elias. Software Vulnerabilities: Identifying, Avoiding, and Mitigating Exploits. Pearson Education, Limited, 2006.
Find full textKriha, Walter, and Roland Schmitz. Internet-Security aus Software-Sicht: Grundlagen der Software-Erstellung für sicherheitskritische Bereiche (Xpert.press). Springer, 2008.
Find full textNational Academies of Sciences, Engineering, and Medicine. Software Update As a Mechanism for Resilience and Security: Proceedings of a Workshop. National Academies Press, 2017.
Find full textRaven, Alder, ed. How to cheat at configuring Open Source security tools. Syngress, 2007.
Find full text