13 Results
000000000000IIE
Cover image for Software security : building security in
by 
McGraw, Gary, 1966-
Format: 
Books
Publication Date 
2006
Excerpt: 
Addison-Wesley software security series. o2006021146 o2006021146
Available: Copies:
Cover image for Secure and resilient software development
by 
Merkow, Mark S.
Format: 
Books
Publication Date 
2010
Excerpt: 
Secure and resilient software development / Merkow, Mark S.
Available: Copies:
Cover image for Security and software for cybercafes
by 
Adomi, Esharenana E.
Format: 
Books
Publication Date 
2008
Excerpt: 
Security and software for cybercafes / Adomi, Esharenana E.
Available: Copies:
by 
Slade, Robert M.
Format: 
Books
Publication Date 
2004
Excerpt: 
Software forensics : collecting evidence from the scene of a digital crime / Slade, Robert M.
Available: Copies:
Cover image for Computer security : principles and practice
by 
Stallings, William, author.
Format: 
Books
Publication Date 
2018
Excerpt: 
Part One: Computer Security Technology and Principles -- Part Two: Software and System Security
Available: Copies:
Cover image for Security in computing
by 
Pfleeger, Charles P., 1948- author.
Format: 
Regular print
Publication Date 
2015
Excerpt: 
the primary source of vulnerability -- software, operating system, protocol, user error -- and not
Available: Copies:
Cover image for Computer security literacy : staying safe in a digital world
by 
Jacobson, Douglas.
Format: 
Books
Publication Date 
2013
Excerpt: 
Software -- 6.5.1.Antivirus Signatures -- 6.5.2.Function of Antivirus Software -- 6.5.3.Antivirus
Available: Copies:
Cover image for A multidisciplinary introduction to information security
by 
Mjølsnes, Stig F.
Format: 
Books
Publication Date 
2012
Excerpt: 
.F. Mjølsnes -- 1.4.10.Software Security / S.F. Mjølsnes -- 1.4.11.ICT Security Evaluation / S.F. Mjølsnes -- 1
Available: Copies:
Cover image for Hacking web apps : detecting and preventing web application security problems
by 
Shema, Mike, author.
Format: 
Books
Publication Date 
2012
Excerpt: 
Application software -- Security measures.
Available: Copies:
Cover image for Seven deadliest social network attacks
by 
Timm, Carl.
Format: 
Books
Publication Date 
2010
Excerpt: 
Malware (Computer software) -- Prevention.
Available: Copies:
Cover image for IT governance : a manager's guide to data security and ISO 27001/ISO 27002
by 
Calder, Alan, 1957-
Format: 
Books
Publication Date 
2008
Excerpt: 
. Communications and operations management -- 13. Controls against malicious software (malware) and back-ups -- 14
Available: Copies:
Cover image for Network security essentials : applications and standards
by 
Stallings, William.
Format: 
Books
Publication Date 
2003
Excerpt: 
-- Intruders -- Malicious Software -- Firewalls. Standards Cited in this Book -- Some Aspects of Number Theory.
Available: Copies: