• Home
  • Advanced Search
  • Directory of Libraries
  • About lib.ir
  • Contact Us
  • History
تعداد ۲۰ پاسخ غیر تکراری از ۲۰ پاسخ تکراری در مدت زمان ۱,۰۹ ثانیه یافت شد.

1. Agile IT security implementation methodology

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Jeff Laskowski

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Agile software development,Computer networks-- Security measures,Computer security

Classification :
QA76
.
9
.
A25
L37
2011

2. Developing and evaluating security-aware software systems /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Khaled M. Khan [editor].

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.

Classification :

3. Developing and evaluating security-aware software systems

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer networks--Security measures.,Computer software--Development.,Computer security.

Classification :
TK5105
.
59
.
D48
2013

4. Fuzzing for software security testing and quality assurance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Takanen, Ari.

Library: Central Library and Documents Center of Al-Zahra University (Tehran)

Subject: ، Computer security,Security measures ، Computer networks,Development ، Computer software

Classification :
QA
76
.
9
.
A25
T335
2008

5. Fuzzing for software security testing and quality assurance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Ari Takanen, Jared DeMott, Charlie Miller.

Library: Campus International Library of Kish University of Tehran (Hormozgan)

Subject: Computer security,Computer networks--Security measures,Computer software -- Development

Classification :
QA
76
.
9
.
A25
T335
2008

6. Fuzzing for software security testing and quality assurance /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ari Takanen, Jared DeMott, Charlie Miller, Atte Kettunen.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
F89
2018eb

7. Fuzzing for software security testing and quality assurance

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Ari Takanen, Jared DeMott, Charlie Miller

Library: Insurance Research Institute Library (Tehran)

Subject: Computer security,Computer networks, Security measures,Computer software, Development

Classification :
QA76
.
9
.
T3F8
2008

8. Fuzzing for software security testing and quality assurance /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ari Takanen, Jared DeMott, Charlie Miller.

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures.,Computer security.,Computer software-- Development.,Logiciels-- Qualité-- Contrôle.,Réseaux d'ordinateurs-- Sécurité-- Mesures.,Sécurité informatique.,Computer networks-- Security measures.,Computer security.,Computer software-- Development.,COMPUTERS-- Internet-- Security.,COMPUTERS-- Networking-- Security.,COMPUTERS-- Security-- General.

Classification :
QA76
.
9
.
A25
T335
2008eb

9. Hacking web apps : detecting and preventing web application security problems

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Shema, Mike.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: Security measures ، Computer networks,Security measures ، Web site development,Security measures ، Application software,، Computer security,Prevention ، Computer crimes

Classification :
TK
5105
.
59
.
S5234
2012

10. Network and application security fundamentals and practices /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Debashis Ganguly ; edited by Shibamouli Lahiri

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Development,Computer networks-- Security measures,Computer security

Classification :
TK5105
.
59
.
G36
2012

11. Pro PHP security

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Chris Snyder, Thomas Myer, Michael Southwell

Library: Central Library and Information Center of Shahed University (Tehran)

Subject: PHP (Computer program language), Handbooks, manuals, etc,Web site development, Security measures, Handbooks, manuals, etc,Web sites, Security measures, Handbooks, manuals, etc,PHP (Computer language), sears,Internet software., sears,Computer networks, Security measures., sears

Classification :
QA
،
76
.
73
،.
P224
,
S59
،
2010

12. Pro Spring security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Carlo Scarioni ; technical reviewer, Manuel Jordan Elera

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Development.,Application software-- Security measures.,Computer networks-- Security measures.,Java (Computer program language),Web site development.

Classification :
QA76
.
76
.
D47
S32
2013eb

13. Pro Spring security /

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Carlo Scarioni ; technical reviewer, Manuel Jordan Elera

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Application software-- Development.,Application software-- Security measures.,Computer networks-- Security measures.,Java (Computer program language),Web site development.

Classification :
QA76
.
76
.
D47
S32
2013eb

14. Security software developmen

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Douglas A. Ashbaugh

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Application software--Development,Computer networks--Security measures,Electronic books.

Classification :
QA
,
76
.
9
,.
A25
,
A8246
,
2009eb

15. Security software development :

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author:

Library: Central Library and Documents Center of Mazandaran University (Mazandaran)

Subject: Computer security. ; Application software ; Development. ; Computer networks ; Security measures. ; Application software ; Development. ; fast ; (OCoLC)fst00811707 ; Computer networks ; Security measures. ; fast ; (OCoLC)fst00872341 ; Computer security. ;

Classification :

16. Security software development

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Douglas A. Ashbaugh

Library: Central Library, Center of Documentation and Supply of Scientific Resources (East Azarbaijan)

Subject: Computer security.,Application software--Development,Computer networks--Security measures

Classification :

17. Security software development. assessing and managing security risks

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Ashbaugh, Douglas A.

Library: Library of Razi Metallurgical Research Center (Tehran)

Subject: ، Computer security,، Application software- Development,، Computer networks- Security measures

Classification :
QA
76
.
9
.
A25
A8246
2009

18. The art of software security assessment

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Mark Dowd, John McDonald, and Justin Schuh

Library: Central Library and Information Center of the University of Mohaghegh Ardabili (Ardabil)

Subject: Computer security,Computer software- Development,Computer networks- Security measures

Classification :
QA76
.
9
.
A25
,
D75
2007

19. The software vulnerability guid

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: / Herbert H. Thompson, Scott G. Chase

Library: Central Library and Document Center of Shahid Chamran University (Khuzestan)

Subject: Computer security.,Computer software--Development,Computer networks--Security measures

Classification :
QA
,
76
.
9
,.
A25
,
T475
,
2005eb

20. Threat modeling

  • اطلاعات استناد دهی
  • BibTex
  • RIS
  • Endnote
  • Refer

Author: Adam Shostack

Library: Center and Library of Islamic Studies in European Languages (Qom)

Subject: Computer networks-- Security measures,Computer security,Computer software-- Development

Classification :
QA76
.
9
.
A25
S495
2014
  • »
  • 1
  • «

Proposal/Bug Report

Warning! Enter The Information Carefully
Send Cancel
This website is managed by Dar Al-Hadith Scientific-Cultural Institute and Computer Research Center of Islamic Sciences (also known as Noor)
Libraries are responsible for the validity of information, and the spiritual rights of information are reserved for them
Best Searcher - The 5th Digital Media Festival