Evaluation Dependability Attributes of Web Application using Vulnerability Assessments Tools
暂无分享,去创建一个
Nordin Abu Bakar | Hasan Kahtan | Rosmawati Nordin | Mansoor Abdullateef Abdulgabbe | H. Kahtan | N. A. Bakar | R. Nordin | Hasan Kahtan | Rosmawati Nordin
[1] CRISPIN COWAN,et al. Software Security for Open-Source Systems , 2003, IEEE Secur. Priv..
[2] Gary Mcgraw. Software security , 2004, IEEE Security & Privacy Magazine.
[3] Mark Curphey,et al. Web application security assessment tools , 2006, IEEE Security & Privacy.
[4] Stacy Simpson. Sharing Lessons Learned: “Practiced” Practices for Software Security , 2012, Datenschutz und Datensicherheit - DuD.
[5] Marcelo Schneck de Paula Pessôa,et al. Prioritization of software security intangible attributes , 2012, ACM SIGSOFT Softw. Eng. Notes.
[6] Martin Molina,et al. A tenant-based resource allocation model for scaling Software-as-a-Service applications over cloud computing infrastructures , 2013, Future Gener. Comput. Syst..