Добірка наукової літератури з теми "Software and application security"
Оформте джерело за APA, MLA, Chicago, Harvard та іншими стилями
Ознайомтеся зі списками актуальних статей, книг, дисертацій, тез та інших наукових джерел на тему "Software and application security".
Біля кожної праці в переліку літератури доступна кнопка «Додати до бібліографії». Скористайтеся нею – і ми автоматично оформимо бібліографічне посилання на обрану працю в потрібному вам стилі цитування: APA, MLA, «Гарвард», «Чикаго», «Ванкувер» тощо.
Також ви можете завантажити повний текст наукової публікації у форматі «.pdf» та прочитати онлайн анотацію до роботи, якщо відповідні параметри наявні в метаданих.
Статті в журналах з теми "Software and application security"
Abozeid, Amr, AbdAllah Adel AlHabshy, and Kamal ElDahshan. "A Software Security Optimization Architecture (SoSOA) and its Adaptation for Mobile Applications." International Journal of Interactive Mobile Technologies (iJIM) 15, no. 11 (June 4, 2021): 148. http://dx.doi.org/10.3991/ijim.v15i11.20133.
Повний текст джерелаPeng, Jianping, Meiwen Guo, and Jing Quan. "Software Vulnerability and Application Security Risk." Information Resources Management Journal 32, no. 1 (January 2019): 48–57. http://dx.doi.org/10.4018/irmj.2019010103.
Повний текст джерелаPayne, Jeffery. "Integrating Application Security into Software Development." IT Professional 12, no. 2 (March 2010): 6–9. http://dx.doi.org/10.1109/mitp.2010.58.
Повний текст джерелаShin, Michael E., Hassan Gomaa, Don Pathirage, Chase Baker, and Bhavya Malhotra. "Design of Secure Software Architectures with Secure Connectors." International Journal of Software Engineering and Knowledge Engineering 26, no. 05 (June 2016): 769–805. http://dx.doi.org/10.1142/s021819401650025x.
Повний текст джерелаKarakaneva, J. "Software applications security." Trakia Journal of Science 12, no. 4 (2014): 418–24. http://dx.doi.org/10.15547/tjs.2014.04.012.
Повний текст джерелаHosniara Pervin. "Software as a service and security." World Journal of Advanced Research and Reviews 11, no. 3 (September 30, 2021): 327–31. http://dx.doi.org/10.30574/wjarr.2021.11.3.0459.
Повний текст джерелаAlgarni, Sultan, Fathy Eassa, Khalid Almarhabi, Abdullah Algarni, and Aiiad Albeshri. "BCNBI: A Blockchain-Based Security Framework for Northbound Interface in Software-Defined Networking." Electronics 11, no. 7 (March 23, 2022): 996. http://dx.doi.org/10.3390/electronics11070996.
Повний текст джерелаKhan, Khaled M. "Software Security Engineering." International Journal of Secure Software Engineering 3, no. 1 (January 2012): 62–63. http://dx.doi.org/10.4018/jsse.2012010104.
Повний текст джерелаRauf, Bilal, Haider Abbas, Muhammad Usman, Tanveer A. Zia, Waseem Iqbal, Yawar Abbas, and Hammad Afzal. "Application Threats to Exploit Northbound Interface Vulnerabilities in Software Defined Networks." ACM Computing Surveys 54, no. 6 (July 2021): 1–36. http://dx.doi.org/10.1145/3453648.
Повний текст джерелаZhai, Hui, Hui Shi, and Rui Zhai. "The Application of Software Testing Technology on Security in Web Application System." Applied Mechanics and Materials 556-562 (May 2014): 6159–61. http://dx.doi.org/10.4028/www.scientific.net/amm.556-562.6159.
Повний текст джерелаДисертації з теми "Software and application security"
Söderquist, Mårten. "Tiny Security : Evaluating energy use for security in an IoT application." Thesis, Mittuniversitetet, Institutionen för data- och systemvetenskap, 2019. http://urn.kb.se/resolve?urn=urn:nbn:se:miun:diva-36860.
Повний текст джерелаDell'Aguzzo, Paolo. "The secret life of software applications." Bachelor's thesis, Alma Mater Studiorum - Università di Bologna, 2014. http://amslaurea.unibo.it/7405/.
Повний текст джерелаWanderydz, Kristoffer. "WEB APPLICATION SECURITY IN THE JAVA ENVIRONMENT." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2012. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2370.
Повний текст джерелаFoster, Nathalie Louise. "The application of software and safety engineering techniques to security protocol development." Thesis, University of York, 2002. http://ethos.bl.uk/OrderDetails.do?uin=uk.bl.ethos.412617.
Повний текст джерелаSrilatha, Rondla, and Gande Someshwar. "Security Testing for Web Applications in SDLC." Thesis, Blekinge Tekniska Högskola, Sektionen för datavetenskap och kommunikation, 2011. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-2903.
Повний текст джерела+91 8977404640
Mayo, Quentin R. "Detection of Generalizable Clone Security Coding Bugs Using Graphs and Learning Algorithms." Thesis, University of North Texas, 2018. https://digital.library.unt.edu/ark:/67531/metadc1404548/.
Повний текст джерелаBackman, Lars. "Why is security still an issue? : A study comparing developers’ software security awareness to existing vulnerabilities in software applications." Thesis, Linköpings universitet, Programvara och system, 2018. http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-153438.
Повний текст джерелаUr-Rehman, Wasi. "Maintaining Web Applications Integrity Running on RADIUM." Thesis, University of North Texas, 2015. https://digital.library.unt.edu/ark:/67531/metadc804975/.
Повний текст джерелаChan, Ping-fai, and 陳秉暉. "Data flow and heap analysis with application to privilege escalation vulnerability scanning and software theft detection." Thesis, The University of Hong Kong (Pokfulam, Hong Kong), 2013. http://hub.hku.hk/bib/B50899569.
Повний текст джерелаpublished_or_final_version
Computer Science
Doctoral
Doctor of Philosophy
Shaffer, Alan B. "An application of Alloy to static analysis for secure information flow and verification of software systems." Monterey, Calif. : Naval Postgraduate School, 2008. http://edocs.nps.edu/npspubs/scholarly/dissert/2008/Dec/08Dec%5FShaffer_PhD.pdf.
Повний текст джерелаDissertation Supervisor: Auguston, Mikhail. "December 2008." Description based on title screen as viewed on January 29, 2009. Includes bibliographical references (p. 87-93). Also available in print.
Книги з теми "Software and application security"
Ashbaugh, Douglas A. Security software development: Assessing and managing security risks. Boca Raton: Auerbach Publications, 2008.
Знайти повний текст джерелаApplication security for the Android platform. Sebastopol, CA: O'Reilly, 2011.
Знайти повний текст джерелаRecx. Hands-on oracle application express security: Building secure apex applications. Indianapolis, Ind: Wiley, 2013.
Знайти повний текст джерелаShibamouli, Lahiri, ed. Network and application security fundamentals and practices. Enfield, NH: Science Publishers, 2011.
Знайти повний текст джерелаSpendolini, Scott. Expert Oracle Application Express Security. Berkeley, CA: Apress, 2013.
Знайти повний текст джерелаMerkow, Mark S. Secure and resilient software development. Boca Raton, FL: CRC Press, 2010.
Знайти повний текст джерелаMerkow, Mark S. Secure and resilient software development. Boca Raton, FL: CRC Press, 2010.
Знайти повний текст джерелаRamachandran, Dr Muthu. Software security engineering: Design and applications. Hauppauge, N. Y: New York : Nova Science Publishers, 2011.
Знайти повний текст джерелаVincent, Liu, ed. Web application security: A beginner's guide. New York: McGraw-Hill, 2012.
Знайти повний текст джерелаSerrão, Carlos. Web Application Security: Iberic Web Application Security Conference, IBWAS 2009, Madrid, Spain, December 10-11, 2009. Revised Selected Papers. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010.
Знайти повний текст джерелаЧастини книг з теми "Software and application security"
Harper, Dave. "Empirical Software Security Assurance." In Web Application Security, 11. Berlin, Heidelberg: Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-16120-9_6.
Повний текст джерелаBansal, Shonak, Krishna Parkash, Prince Jain, Sanjeev Kumar, Neena Gupta, and Arun K. Singh. "Photodetectors for Security Application." In Nanoelectronic Devices for Hardware and Software Security, 279–300. Boca Raton: CRC Press, 2021. http://dx.doi.org/10.1201/9781003126645-14.
Повний текст джерелаSala, Adi, Marius Constantin Popescu, and Antoanela Naaji. "Software for Integral Security." In Soft Computing Applications, 285–93. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51992-6_22.
Повний текст джерелаDesnos, Anthony, and Robert Erra. "Descriptional Entropy: Application to Security Software Analysis." In Lecture Notes in Computer Science, 225–30. Berlin, Heidelberg: Springer Berlin Heidelberg, 2013. http://dx.doi.org/10.1007/978-3-642-38227-7_25.
Повний текст джерелаBelleville, Nicolas, Karine Heydemann, Damien Couroussé, Thierno Barry, Bruno Robisson, Abderrahmane Seriai, and Henri-Pierre Charles. "Automatic Application of Software Countermeasures Against Physical Attacks." In Cyber-Physical Systems Security, 135–55. Cham: Springer International Publishing, 2018. http://dx.doi.org/10.1007/978-3-319-98935-8_7.
Повний текст джерелаGollmann, Dieter. "Security in Distributed Applications." In Advances in Software Engineering, 254–76. Berlin, Heidelberg: Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-89762-0_9.
Повний текст джерелаPan, Ping, Xuan Zhu, and Xinyue Mao. "Security Test for Application Software Based on SPN." In Advances in Intelligent Systems and Computing, 240–49. Cham: Springer International Publishing, 2017. http://dx.doi.org/10.1007/978-3-319-60744-3_26.
Повний текст джерелаMadou, Matias, Bertrand Anckaert, Patrick Moseley, Saumya Debray, Bjorn De Sutter, and Koen De Bosschere. "Software Protection Through Dynamic Code Mutation." In Information Security Applications, 194–206. Berlin, Heidelberg: Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11604938_15.
Повний текст джерелаLakhno, V., B. Akhmetov, V. Chubaievskyi, Alona Desiatko, K. Palaguta, A. Blozva, and Y. Chasnovskyi. "Information Security Audit Method Based on the Use of a Neuro-Fuzzy System." In Software Engineering Application in Informatics, 171–84. Cham: Springer International Publishing, 2021. http://dx.doi.org/10.1007/978-3-030-90318-3_17.
Повний текст джерелаPeng, Kun. "Paid and Anonymous Usage of Cloud Software." In Information Security Applications, 308–20. Cham: Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-65299-9_23.
Повний текст джерелаТези доповідей конференцій з теми "Software and application security"
Kantarcioglu, Murat. "Session details: Software Security." In CODASPY'15: Fifth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2015. http://dx.doi.org/10.1145/3257827.
Повний текст джерелаChavan, A. Maurizio. "Web application security: CAS and beyond." In Software and Cyberinfrastructure for Astronomy V, edited by Juan C. Guzman and Jorge Ibsen. SPIE, 2018. http://dx.doi.org/10.1117/12.2312062.
Повний текст джерелаYang, Jinqiu, Lin Tan, John Peyton, and Kristofer A Duer. "Towards Better Utilizing Static Application Security Testing." In 2019 IEEE/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). IEEE, 2019. http://dx.doi.org/10.1109/icse-seip.2019.00014.
Повний текст джерелаWu, Nan, FangMin Song, and Xiangdong Li. "Quantum searching application in search based software engineering." In SPIE Defense, Security, and Sensing, edited by Eric Donkor, Andrew R. Pirich, and Howard E. Brandt. SPIE, 2013. http://dx.doi.org/10.1117/12.2018874.
Повний текст джерелаValentine, Sidney, and Csilla Farkas. "Software security: Application-level vulnerabilities in SCADA systems." In Integration (IRI). IEEE, 2011. http://dx.doi.org/10.1109/iri.2011.6009603.
Повний текст джерелаElder, Sarah, Nusrat Zahan, Valeri Kozarev, Rui Shu, Tim Menzies, and Laurie Williams. "Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard." In 2021 IEEE/ACM 43rd International Conference on Software Engineering: Software Engineering Education and Training (ICSE-SEET). IEEE, 2021. http://dx.doi.org/10.1109/icse-seet52601.2021.00019.
Повний текст джерелаPlauth, Max, Fredrik Teschke, Daniel Richter, and Andreas Polze. "Hardening Application Security Using Intel SGX." In 2018 IEEE International Conference on Software Quality, Reliability and Security (QRS). IEEE, 2018. http://dx.doi.org/10.1109/qrs.2018.00050.
Повний текст джерелаRay, Indrakshi. "Session details: Session 3: Software Security." In CODASPY '22: Twelveth ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM, 2022. http://dx.doi.org/10.1145/3532564.
Повний текст джерелаElsayed, Marwa A., and Mohammad Zulkernine. "Integrating Security in Cloud Application Development Cycle." In 2018 International Conference on Software Security and Assurance (ICSSA). IEEE, 2018. http://dx.doi.org/10.1109/icssa45270.2018.00013.
Повний текст джерелаCollberg, Christian, Sam Martin, Jonathan Myers, and Jasvir Nagra. "Distributed application tamper detection via continuous software updates." In the 28th Annual Computer Security Applications Conference. New York, New York, USA: ACM Press, 2012. http://dx.doi.org/10.1145/2420950.2420997.
Повний текст джерелаЗвіти організацій з теми "Software and application security"
Alberts, Christopher, Julia Allen, and Robert Stoddard. Risk-Based Measurement and Analysis: Application to Software Security. Fort Belvoir, VA: Defense Technical Information Center, February 2012. http://dx.doi.org/10.21236/ada611106.
Повний текст джерелаDebray, Saumya. Topics in Low-Level Reverse Engineering, with Applications to Software Security. Fort Belvoir, VA: Defense Technical Information Center, January 2010. http://dx.doi.org/10.21236/ada567214.
Повний текст джерелаRazdan, Rahul. Unsettled Issues Regarding Autonomous Vehicles and Open-source Software. SAE International, April 2021. http://dx.doi.org/10.4271/epr2021009.
Повний текст джерелаSouppaya, Murugiah, John Morello, and Karen Scarfone. Application container security guide. Gaithersburg, MD: National Institute of Standards and Technology, September 2017. http://dx.doi.org/10.6028/nist.sp.800-190.
Повний текст джерелаBirman, Ken, and Fred Schneider. Security Risks from a Software Monoculture. Fort Belvoir, VA: Defense Technical Information Center, November 2008. http://dx.doi.org/10.21236/ada492371.
Повний текст джерелаEvans, Rick. Invensys Foxboro Control Software Security Assessment. Office of Scientific and Technical Information (OSTI), February 2014. http://dx.doi.org/10.2172/1122068.
Повний текст джерелаSkalka, Christian. Trace Effect Analysis for Software Security. Fort Belvoir, VA: Defense Technical Information Center, February 2010. http://dx.doi.org/10.21236/ada515457.
Повний текст джерелаChandramouli, Ramaswamy. Securing the Artifacts in Software Supply Chain for Building Cloud-Native Microservices Applications. Gaithersburg, MD: National Institute of Standards and Technology, 2023. http://dx.doi.org/10.6028/nist.sp.800-204d.ipd.
Повний текст джерелаMiller, Barton P. Institute for Scalable Application Development Software. Office of Scientific and Technical Information (OSTI), November 2012. http://dx.doi.org/10.2172/1063806.
Повний текст джерелаMcDonald, Jeffrey T. Foundations for Security Aware Software Development Education. Fort Belvoir, VA: Defense Technical Information Center, November 2005. http://dx.doi.org/10.21236/ada441224.
Повний текст джерела