[CSUSB]>> [CNS]>> [CSE]>> [R J Botting]>> biba.php

Bibliographic Item (1.0)

Geer10

  1. David Geer
  2. Are companies actually using secure development life cycles
  3. IEEE Computer Magazine V43n6(Jun 2010)pp12-15
  4. =POLL SECURITY METHODS PROCESSES SDLs SDL-agile SAMM BSIMM SSDL CLASP
  5. Security has to be part of the development of software from the get go -- it can not be added later.
  6. Can use static analysis to catch holes in code. Most security holes are design holes. Commonly letting in unexpected attacks.
  7. Need to analyze and model threats.
  8. Survey by Errata.
  9. 81% were aware but only 39% are using a "formal methodology".
  10. Reasons not used include time, no need, cost, ...

Search for bibliographic items containing a matching string.


(Search uses POSIX regular expressions and ignores case)

Search for a specific bibliographic item by name.



To see the complete bibliography (1Mb+) select:[Bibliography]