21.01.2022 Views

Sommerville-Software-Engineering-10ed

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 13 ■ References 407

Jenney, P. 2013. “Static Analysis Strategies: Success with Code Scanning.” http://msdn.microsoft

.com/en-us/security/gg615593.aspx

Lane, A. 2010. “Agile Development and Security.” https://securosis.com/blog/agile-developmentand-security

Pfleeger, C. P., and S. L. Pfleeger. 2007. Security in Computing, 4th ed. Boston: Addison-Wesley.

Safecode. 2012. “Practical Security Stories and Security Tasks for Agile Development Environments.”

http://www.safecode.org/publications/SAFECode_Agile_Dev_Security0712.pdf

Schneier, B. 1999. “Attack Trees.” Dr Dobbs Journal 24 (12): 1–9. https://www.schneier.com/paperattacktrees-ddj-ft.html

. 2000. Secrets and Lies: Digital Security in a Networked World. New York: John Wiley & Sons.

Schoenfield, B. 2013. “Agile and Security: Enemies for Life?” http://brookschoenfield.com/?p=151

Sindre, G., and A. L. Opdahl. 2005. “Eliciting Security Requirements through Misuse Cases.”

Requirements Engineering 10 (1): 34–44. doi:10.1007/s00766-004-0194-4.

Spafford, E. 1989. “The Internet Worm: Crisis and Aftermath.” Comm ACM 32 (6): 678–687.

doi:10.1145/63526.63527.

Stallings, W., and L. Brown. 2012. Computer Security: Principles, d Practice. (2nd ed.) Boston:

Addison-Wesley.

Viega, J., and G. McGraw. 2001. Building Secure Software. Boston: Addison-Wesley.

Wheeler, D. A. 2004. Secure Programming for Linux and Unix. Self-published. http://www.dwheeler

.com/secure-programs/

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!