Please use this identifier to cite or link to this item:
https://gnanaganga.inflibnet.ac.in:8443/jspui/handle/123456789/10650
Full metadata record
DC Field | Value | Language |
---|---|---|
dc.contributor.author | Adam Shostack | - |
dc.contributor.author | Mary Ellen Zurko | - |
dc.date.accessioned | 2024-02-27T07:52:26Z | - |
dc.date.available | 2024-02-27T07:52:26Z | - |
dc.date.issued | 2020 | - |
dc.identifier.uri | http://gnanaganga.inflibnet.ac.in:8080/jspui/handle/123456789/10650 | - |
dc.description.abstract | WRITING CODE THAT is secure, and provides security without vulnerabilities, is a critical challenge to cybersecurity. Writing code without vulnerabilities has long been at least as difficult as writing code without bugs. While there are many other potential sources of security exposures in software, developing code without known classes of vulnerabilities has always seemed like a tractable goal. | - |
dc.publisher | Communications of the ACM | - |
dc.title | Privacy and Security Secure Development Tools and Techniques Need More Research that Will Increase Their Impact and Effectiveness in Practice | - |
dc.vol | Vol 63 | - |
dc.issued | No 5 | - |
Appears in Collections: | Articles to be qced |
Files in This Item:
File | Size | Format | |
---|---|---|---|
Privacy and Security Secure Development Tools and Techniques Need More Research That Will Increase Their Impact and Effectiveness in Practice.pdf Restricted Access | 1.91 MB | Adobe PDF | View/Open Request a copy |
Items in DSpace are protected by copyright, with all rights reserved, unless otherwise indicated.