The Community for Technology Leaders
Green Image
Issue No. 06 - November/December (2008 vol. 6)
ISSN: 1540-7993
pp: 82-85
John Steven , Cigital
We've finished the missionary work: people know software's the problem. The question has become how do we find which of our systems are most vulnerable and why? This article looks at the state of assessment practice and offers some suggestions.
Building security in, software, assessment
John Steven, "State of Application Assessment", IEEE Security & Privacy, vol. 6, no. , pp. 82-85, November/December 2008, doi:10.1109/MSP.2008.155
109 ms
(Ver 3.3 (11022016))