Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,692,699 papers from all fields of science
Search
Sign In
Create Free Account
Software Development Security
Security is part of software development process, is an ongoing process involving people and practices, and ensures application confidentiality…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
16 relations
Denial-of-service attack
Information security
Information system
Integrated development environment
Expand
Broader (1)
Software development
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2018
2018
CISSP Official (ISC)2 Practice Tests 2nd Edition
M. Chapple
,
D. Seidl
2018
Corpus ID: 69927218
The (ISC) 2 CISSP Official Practice Tests is a major resource for CISSP candidates, providing 1300 unique practice questions. The…
Expand
Review
2017
Review
2017
CISSP Cert Guide, Pearson uCertify Course, and uCertify Labs Bundle
Troy McMillan
,
Robin Abernathy
,
uCertify
2017
Corpus ID: 196015948
Welcome to CISSP Pearson uCertify Course and Labs and Textbook Bundle CISSP Pearson uCertify Course and Labs is an easy-to-use…
Expand
2014
2014
Long on Rhetoric, Short on Results: Agile Methods and Cyber Acquisitions in the Department of Defense
D. Schoeni
2014
Corpus ID: 56473503
The military depends on software for nearly all that it does, yet the process for developing software is fundamentally broken…
Expand
2014
2014
Domain 4: Software Development Security
E. Conrad
,
Seth Misenar
,
Joshua Feldman
2014
Corpus ID: 58451131
2012
2012
Chapter 5 – Domain 4: Software Development Security
E. Conrad
,
Seth Misenar
,
Joshua Feldman
2012
Corpus ID: 64179054
2004
2004
Role-Based Access Controls: Status, Dissemination, and Prospects for Generic Security Mechanisms
W. Eßmayr
,
S. Probst
,
E. Weippl
Electronic Commerce Research
2004
Corpus ID: 16298496
E-commerce applications have diverse security requirements ranging from business-to-business over business-to-consumer to…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE