1. Agile IT security implementation methodology
Author: Jeff Laskowski
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Agile software development,Computer networks-- Security measures,Computer security
Classification :
QA76
.
9
.
A25
L37
2011


2. Developing and evaluating security-aware software systems /
Author: Khaled M. Khan [editor].
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.

3. Developing and evaluating security-aware software systems
Author:
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer networks--Security measures.,Computer software--Development.,Computer security.
Classification :
TK5105
.
59
.
D48
2013


4. Fuzzing for software security testing and quality assurance
Author: Takanen, Ari.
Library: Central Library and Documents Center of Al-Zahra University (Tehran)
Subject: ، Computer security,Security measures ، Computer networks,Development ، Computer software
Classification :
QA
76
.
9
.
A25
T335
2008


5. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
F89
2018eb


6. Fuzzing for software security testing and quality assurance
Author: / Ari Takanen, Jared DeMott, Charlie Miller.
Library: Campus International Library of Kish University of Tehran (Hormozgan)
Subject: Computer security,Computer networks--Security measures,Computer software -- Development
Classification :
QA
76
.
9
.
A25
T335
2008


7. Fuzzing for software security testing and quality assurance
Author: / Ari Takanen, Jared DeMott, Charlie Miller
Library: Insurance Research Institute Library (Tehran)
Subject: Computer security,Computer networks, Security measures,Computer software, Development
Classification :
QA76
.
9
.
T3F8
2008


8. Fuzzing for software security testing and quality assurance /
Author: Ari Takanen, Jared DeMott, Charlie Miller.
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Logiciels-- Qualité-- Contrôle.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.
Classification :
QA76
.
9
.
A25
T335
2008eb


9. Hacking web apps : detecting and preventing web application security problems
Author: Shema, Mike.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: Security measures ، Computer networks,Security measures ، Web site development,Security measures ، Application software,، Computer security,Prevention ، Computer crimes
Classification :
TK
5105
.
59
.
S5234
2012


10. Network and application security fundamentals and practices /
Author: Debashis Ganguly ; edited by Shibamouli Lahiri
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development,Computer networks-- Security measures,Computer security
Classification :
TK5105
.
59
.
G36
2012


11. Pro PHP security
Author: Chris Snyder, Thomas Myer, Michael Southwell
Library: Central Library and Information Center of Shahed University (Tehran)
Subject: PHP (Computer program language), Handbooks, manuals, etc,Web site development, Security measures, Handbooks, manuals, etc,Web sites, Security measures, Handbooks, manuals, etc,PHP (Computer language), sears,Internet software., sears,Computer networks, Security measures., sears
Classification :
QA
،
76
.
73
،.
P224
,
S59
،
2010


12. Pro Spring security /
Author: Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development.,Application software-- Security measures.,Computer networks-- Security measures.,Java (Computer program language),Web site development.
Classification :
QA76
.
76
.
D47
S32
2013eb


13. Pro Spring security /
Author: Carlo Scarioni ; technical reviewer, Manuel Jordan Elera
Library: Center and Library of Islamic Studies in European Languages (Qom)
Subject: Application software-- Development.,Application software-- Security measures.,Computer networks-- Security measures.,Java (Computer program language),Web site development.
Classification :
QA76
.
76
.
D47
S32
2013eb


14. Security for service oriented architectures
Author: Williams, Walter,Walter Williams
Library: Library and Documentation Center of Kurdistan University (Kurdistan)
Subject: ، Service-oriented architecture )Computer science(,Security measures ، Computer networks,، Computer security,، COMPUTERS / Software Development & Engineering / General,، COMPUTERS / Security / General,، COMPUTERS / Internet / General
Classification :
TK
5105
.
5828
.
W5


15. Security software developmen
Author: / Douglas A. Ashbaugh
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures,Electronic books.
Classification :
QA
,
76
.
9
,.
A25
,
A8246
,
2009eb


16. Security software development :
Author:
Library: Central Library and Documents Center of Mazandaran University (Mazandaran)
Subject: Computer security. ; Application software ; Development. ; Computer networks ; Security measures. ; Application software ; Development. ; fast ; (OCoLC)fst00811707 ; Computer networks ; Security measures. ; fast ; (OCoLC)fst00872341 ; Computer security. ;

17. Security software development
Author: / Douglas A. Ashbaugh
Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)
Subject: Computer security.,Application software--Development,Computer networks--Security measures

18. Security software development. assessing and managing security risks
Author: Ashbaugh, Douglas A.
Library: Library of Razi Metallurgical Research Center (Tehran)
Subject: ، Computer security,، Application software- Development,، Computer networks- Security measures
Classification :
QA
76
.
9
.
A25
A8246
2009


19. The art of software security assessment
Author: / Mark Dowd, John McDonald, and Justin Schuh
Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)
Subject: Computer security,Computer software- Development,Computer networks- Security measures
Classification :
QA76
.
9
.
A25
,
D75
2007


20. The software vulnerability guid
Author: / Herbert H. Thompson, Scott G. Chase
Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)
Subject: Computer security.,Computer software--Development,Computer networks--Security measures
Classification :
QA
,
76
.
9
,.
A25
,
T475
,
2005eb

