咨询与建议

限定检索结果

文献类型

  • 5 篇 会议
  • 4 篇 期刊文献

馆藏范围

  • 9 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 8 篇 工学
    • 7 篇 计算机科学与技术...
    • 4 篇 电气工程
    • 4 篇 软件工程
    • 2 篇 动力工程及工程热...
    • 2 篇 控制科学与工程
    • 1 篇 力学(可授工学、理...
    • 1 篇 机械工程
    • 1 篇 电子科学与技术(可...
    • 1 篇 建筑学
    • 1 篇 化学工程与技术
    • 1 篇 交通运输工程
    • 1 篇 环境科学与工程(可...
    • 1 篇 城乡规划学
    • 1 篇 安全科学与工程
  • 3 篇 教育学
    • 3 篇 教育学
  • 1 篇 法学
    • 1 篇 社会学
  • 1 篇 理学
    • 1 篇 地理学
  • 1 篇 医学
    • 1 篇 公共卫生与预防医...
  • 1 篇 管理学
    • 1 篇 管理科学与工程(可...
    • 1 篇 公共管理

主题

  • 9 篇 secure coding pr...
  • 2 篇 web applications
  • 2 篇 code vulnerabili...
  • 2 篇 encoding
  • 2 篇 secure programmi...
  • 1 篇 attack detection
  • 1 篇 task analysis
  • 1 篇 agile methodolog...
  • 1 篇 learning environ...
  • 1 篇 ide-based learni...
  • 1 篇 educational inte...
  • 1 篇 software enginee...
  • 1 篇 browsers
  • 1 篇 cross-site scrip...
  • 1 篇 threat modeling
  • 1 篇 computer securit...
  • 1 篇 security integra...
  • 1 篇 usable security
  • 1 篇 data masking
  • 1 篇 mobile applicati...

机构

  • 1 篇 univ vienna fac ...
  • 1 篇 babcock universi...
  • 1 篇 tu berlin qual &...
  • 1 篇 king mongkuts un...
  • 1 篇 univ n carolina ...
  • 1 篇 noroff univ coll...
  • 1 篇 nelson mandela u...
  • 1 篇 winthrop univ ro...
  • 1 篇 nelson mandela u...
  • 1 篇 nanyang technol ...
  • 1 篇 univ coimbra dep...
  • 1 篇 vienna univ tech...
  • 1 篇 h brs univ appl ...
  • 1 篇 noroff univ coll...

作者

  • 2 篇 van niekerk joha...
  • 2 篇 futcher lynn
  • 1 篇 shar lwin khin
  • 1 篇 gorski peter leo
  • 1 篇 zgrablic luka
  • 1 篇 redzepagic jasmi...
  • 1 篇 antunes nuno
  • 1 篇 shokunbi opeyemi
  • 1 篇 bosnjak maristel...
  • 1 篇 thomas tyler
  • 1 篇 awodele oludele
  • 1 篇 uche obinna
  • 1 篇 porrawatpreyakor...
  • 1 篇 sodanil maleerat
  • 1 篇 akinwunmi damila...
  • 1 篇 moeller sebastia...
  • 1 篇 bangani sifiso
  • 1 篇 lipford heather ...
  • 1 篇 quirchmayr geral...
  • 1 篇 mdunyelwa vuyolw...

语言

  • 8 篇 英文
  • 1 篇 其他
检索条件"主题词=secure coding practices"
9 条 记 录,以下是1-10 订阅
排序:
"I just looked for the solution!"On Integrating Security-Relevant Information in Non-Security API Documentation to Support secure coding practices
收藏 引用
IEEE TRANSACTIONS ON SOFTWARE ENGINEERING 2022年 第9期48卷 3467-3484页
作者: Gorski, Peter Leo Moeller, Sebastian Wiefling, Stephan Lo Iacono, Luigi H BRS Univ Appl Sci Dept Comp Sci Data & Applicat Secur Grp D-53757 St Augustin Germany TU Berlin Qual & Usabil Lab D-10623 Berlin Germany
Software developers build complex systems using plenty of third-party libraries. Documentation is key to understand and use the functionality provided via the libraries' APIs. Therefore, functionality is the main ... 详细信息
来源: 评论
A Knowledge Transfer Framework for secure coding practices  12
A Knowledge Transfer Framework for Secure Coding Practices
收藏 引用
12th int joint conf comp sci software engn (Jcsse)
作者: Sodanil, Maleerat Porrawatpreyakorn, Nalinpat Quirchmayr, Gerald Tjoa, A. Min King Mongkuts Univ Technol North Bangkok Fac Informat Technol Bangkok Thailand Univ Vienna Fac Comp Sci Vienna Austria Vienna Univ Technol Informat & Software Engn Grp Vienna Austria
Building a secure software product is required understandings of security principles and guidelines for the secure coding in terms of programming languages to develop safe, reliable, and secure systems in software dev... 详细信息
来源: 评论
An Educational Intervention for Teaching secure coding practices  12th
An Educational Intervention for Teaching Secure Coding Pract...
收藏 引用
12th IFIP WG 11.8 World Conference on Information Security Education (WISE)
作者: Mdunyelwa, Vuyolwethu Futcher, Lynn van Niekerk, Johan Nelson Mandela Univ Port Elizabeth South Africa Noroff Univ Coll Kristiansand Norway
Cybersecurity vulnerabilities are typically addressed through the implementation of various cybersecurity controls. These controls can be operational, technical or physical in nature. The focus of this paper is on tec... 详细信息
来源: 评论
Defending against Cross-Site Scripting Attacks
收藏 引用
COMPUTER 2012年 第3期45卷 55-62页
作者: Shar, Lwin Khin Tan, Hee Beng Kuan Nanyang Technol Univ Sch Elect & Elect Engn Singapore Singapore
Researchers have proposed multiple solutions to cross-site scripting, but vulnerabilities continue to exist in many Web applications due to developers' lack of understanding of the problem and their unfamiliarity ... 详细信息
来源: 评论
Defending against Web Application Vulnerabilities
收藏 引用
COMPUTER 2012年 第2期45卷 66-72页
作者: Antunes, Nuno Vieira, Marco Univ Coimbra Dept Informat Sci & Technol P-3000 Coimbra Portugal
Although no single tool or technique can guard against the host of possible attacks, a defense-in-depth approach, with overlapping protections, can help secure Web applications.
来源: 评论
Embedding secure coding Instruction Into the IDE: Complementing Early and Intermediate CS Courses With ESIDE
收藏 引用
JOURNAL OF EDUCATIONAL COMPUTING RESEARCH 2018年 第3期56卷 415-438页
作者: Whitney, Michael Lipford, Heather Richter Chu, Bill Thomas, Tyler Winthrop Univ Rock Hill SC 29733 USA Univ N Carolina Charlotte NC 28223 USA
Many of the software security vulnerabilities that people face today can be remediated through secure coding practices. A critical step toward the practice of secure coding is ensuring that our computing students are ... 详细信息
来源: 评论
An Approach to Teaching secure Programming in the .NET Environment  48th
An Approach to Teaching Secure Programming in the .NET Envir...
收藏 引用
48th Annual Conference of the Southern-African-Computer-Lecturers'-Association (SACLA)
作者: Bangani, Sifiso Futcher, Lynn van Niekerk, Johan Nelson Mandela Univ Dept IT Port Elizabeth South Africa Noroff Univ Coll Fac Comp Kristiansand Norway
The security aspect of software applications is considered as the important aspect that can reflect the ability of a system to prevent data exposures and loss of information. For businesses that rely on software solut... 详细信息
来源: 评论
SECURITY INTEGRATION IN AGILE METHODOLOGY
SECURITY INTEGRATION IN AGILE METHODOLOGY
收藏 引用
2024 IEEE SmartBlock4Africa, SmartBlock4Africa 2024
作者: Shokunbi, Opeyemi Uche, Obinna Akinwunmi, Damilare Akinwumi, Hannah Awodele, Oludele Ayankoya, Folasade Babcock University Dept. of Computer Science Ilishan-Remo Nigeria
This systematic review explores the integration of security practices into Agile software development. Through a comprehensive analysis of academic papers, industry reports, and case studies, the review identifies key... 详细信息
来源: 评论
DATA MASKING AND TOKENISATION  35
DATA MASKING AND TOKENISATION
收藏 引用
35th International DAAAM Symposium on Intelligent Manufacturing and Automation, DAAAM 2024
作者: Bosnjak, Maristela Redzepagic, Jasmin Zgrablic, Luka
This research paper examines mobile application security, focusing on data masking and tokenisation, which are essential for protecting sensitive data on Android and iOS platforms. It delves into platform-specific vul... 详细信息
来源: 评论