Search Results for - Narrowed by: Computer networks -- Security measures. - Computer software -- Development.
SirsiDynix Enterprise
https://catalog.iyte.edu.tr/client/en_US/default/default/qf$003dSUBJECT$002509Subject$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$002509Computer$002bnetworks$002b--$002bSecurity$002bmeasures.$0026qf$003dSUBJECT$002509Subject$002509Computer$002bsoftware$002b--$002bDevelopment.$002509Computer$002bsoftware$002b--$002bDevelopment.$0026ps$003d300?
2024-06-03T12:37:34Z
Fixing an insecure software life cycle : practical techniques for building security into existing software development programs
ent://SD_ILS/0/SD_ILS:2316498
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Wright, April C., author.<br/><a href="https://learning.oreilly.com/library/view/~/9781492028222">https://learning.oreilly.com/library/view/~/9781492028222</a>
<a href="https://learning.oreilly.com/library/view/~/9781492028222/?ar">https://learning.oreilly.com/library/view/~/9781492028222/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar">https://go.oreilly.com/library-access/library/view/-/9781492028222/?ar</a><br/>Format: Electronic Resources<br/>
Threat modeling : designing for security
ent://SD_ILS/0/SD_ILS:2302626
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Shostack, Adam, author.<br/><a href="https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar">https://go.oreilly.com/library-access/library/view/-/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057/?ar">https://learning.oreilly.com/library/view/~/9781118810057/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/9781118810057">https://learning.oreilly.com/library/view/~/9781118810057</a><br/>Format: Electronic Resources<br/>
Developing and evaluating security-aware software systems
ent://SD_ILS/0/SD_ILS:476373
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Khan, Khaled M., 1959- editor.<br/>Knovel <a href="http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/">http://app.knovel.com/web/toc.v/cid:kpDESASS0W/viewerType:toc/</a><br/>Format: Electronic Resources<br/>
Spring Security 3.x cookbook
ent://SD_ILS/0/SD_ILS:2154923
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Mankale, Anjana.<br/><a href="https://ebookcentral.proquest.com/lib/iyte/detail.action?docID=1532014">Click to View</a><br/>Format: Electronic Resources<br/>
Fuzzing for Software Security Testing and Quality Assurance.
ent://SD_ILS/0/SD_ILS:1207716
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Takanen, Ari.<br/><a href="http://ebookcentral.proquest.com/lib/iyte/detail.action?docID=456884">Click to View</a><br/>Format: Electronic Resources<br/>
Fuzzing : brute force vulnerabilty discovery
ent://SD_ILS/0/SD_ILS:2283451
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Sutton, Michael, 1973-<br/><a href="https://learning.oreilly.com/library/view/~/9780321446114">https://learning.oreilly.com/library/view/~/9780321446114</a>
<a href="https://learning.oreilly.com/library/view/~/9780321446114/?ar">https://learning.oreilly.com/library/view/~/9780321446114/?ar</a>
<a href="https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar">https://go.oreilly.com/library-access/library/view/-/9780321446114/?ar</a><br/>Format: Electronic Resources<br/>
The art of software security assessment : identifying and preventing software vulnerabilities
ent://SD_ILS/0/SD_ILS:2282886
2024-06-03T12:37:34Z
2024-06-03T12:37:34Z
by Dowd, Mark.<br/><a href="https://go.oreilly.com/library-access/library/view/-/0321444426/?ar">https://go.oreilly.com/library-access/library/view/-/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426/?ar">https://learning.oreilly.com/library/view/~/0321444426/?ar</a>
<a href="https://learning.oreilly.com/library/view/~/0321444426">https://learning.oreilly.com/library/view/~/0321444426</a><br/>Format: Electronic Resources<br/>