Search Results for - Narrowed by: Computer networks -- Security measures. - Computer software -- Development. SirsiDynix Enterprise https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware$002b--$002bDevelopment.$002509Computer$002bsoftware$002b--$002bDevelopment.$0026ps$003d300? 2024-06-03T12:37:34Z Fixing an insecure software life cycle : practical techniques for building security into existing software development programs ent://SD_ILS/0/SD_ILS:2316498 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a> <a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format:&#160;Electronic Resources<br/> Threat modeling : designing for security ent://SD_ILS/0/SD_ILS:2302626 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a> <a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format:&#160;Electronic Resources<br/> Developing and evaluating security-aware software systems ent://SD_ILS/0/SD_ILS:476373 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format:&#160;Electronic Resources<br/> Spring Security 3.x cookbook ent://SD_ILS/0/SD_ILS:2154923 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1532014">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing for Software Security Testing and Quality Assurance. ent://SD_ILS/0/SD_ILS:1207716 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format:&#160;Electronic Resources<br/> Fuzzing : brute force vulnerabilty discovery ent://SD_ILS/0/SD_ILS:2283451 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a> <a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a> <a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format:&#160;Electronic Resources<br/> The art of software security assessment : identifying and preventing software vulnerabilities ent://SD_ILS/0/SD_ILS:2282886 2024-06-03T12:37:34Z 2024-06-03T12:37:34Z by&#160;Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a> <a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format:&#160;Electronic Resources<br/>