Keeping Ahead of Our Adversaries

IEEE Software, Volume 33, Issue 3, 2016, Pages 24-28.

Cited by: 5|Bibtex|Views10|DOI:https://doi.org/10.1109/MS.2016.75
EI WOS
Other Links: dblp.uni-trier.de|dl.acm.org|academic.microsoft.com

Abstract:

Building a secure system requires proactive, rigorous analysis of the threats to which it might be exposed, followed by systematic transformation of those threats into security-related requirements. These requirements can then be tracked throughout the development life cycle. The Web extra at https://youtu.be/77FTWWj1clk is an audio podca...More

Code:

Data:

Your rating :
0

 

Tags
Comments