Secure Design Patterns
暂无分享,去创建一个
Robert C. Seacord | David Svoboda | Kirk Sayre | Chad R. Dougherty | Kazuya Togashi | R. Seacord | David Svoboda | Chad Dougherty | Kirk Sayre | Kazuya Togashi | Kirk Sayre | David Svoboda
[1] Max Jacobson,et al. A Pattern Language: Towns, Buildings, Construction , 1981 .
[2] Ralph Johnson,et al. design patterns elements of reusable object oriented software , 2019 .
[3] Edward A. Fox,et al. Digital libraries , 1995, CACM.
[4] Joseph W. Yoder,et al. Architectural Patterns for Enabling Application Security , 1998 .
[5] Brian W. Kernighan,et al. The Practice of Programming , 1999 .
[6] Laurie A. Williams,et al. Hacker or hero? - extreme programming today (panel session) , 2000, OOPSLA '00.
[7] John Viega,et al. Secure programming cookbook for C and C , 2003 .
[8] Ramesh Nagappan,et al. Core Security Patterns: Best Practices and Strategies for J2EE, Web Services, and Identity Management , 2005 .
[9] Peter Sommerlad,et al. Security Patterns: Integrating Security and Systems Engineering , 2006 .
[10] M. Pursley. Report Documentation Page Form Approved Omb No. 0704-0188 Please Do Not Return Your Form to the above Address. 1. Report Date (dd-mm-yyyy) Final Technical Report Receiver Statistics for Cognitive Radios in Dynamic Spectrum Access Networks Onr , 2007 .
[11] Robert C. Seacord. The CERT C Secure Coding Standard , 2008 .
[12] Marius Iulian Mihailescu,et al. Security Design Patterns , 2010 .