This Article 
   
 Share 
   
 Bibliographic References 
   
 Add to: 
 
Digg
Furl
Spurl
Blink
Simpy
Google
Del.icio.us
Y!MyWeb
 
 Search 
   
State of Application Assessment
November/December 2008 (vol. 6 no. 6)
pp. 82-85
John Steven, Cigital
We've finished the missionary work: people know software's the problem. The question has become how do we find which of our systems are most vulnerable and why? This article looks at the state of assessment practice and offers some suggestions.
Index Terms:
Building security in, software, assessment
Citation:
John Steven, "State of Application Assessment," IEEE Security & Privacy, vol. 6, no. 6, pp. 82-85, Nov.-Dec. 2008, doi:10.1109/MSP.2008.155
Usage of this product signifies your acceptance of the Terms of Use.