Location of Repository

A Look at “Software Security Engineering: A Guide for Project Managers ” ©

By Julia H. Allen, Dr. Robert, J. Ellison, Dr. Nancy, R. Mead and Cigital Inc

Abstract

Guide for Project Managers ” [1] 1 —and its key resource, the Build Security In (BSI) Web site—provide software project managers with sound practices that they can evaluate and selectively adopt to help reshape their own development practices. Software developed and assembled using these practices should contain significantly fewer exploitable weaknesses. Software is ubiquitous. Many of the products, services, and processes that organizations use and offer are highly dependent on software to handle the sensitive and high-value data on which people’s privacy, livelihoods, and very lives depend. National security relies on increasingly complex, interconnected, software-intensive information systems— systems that (in many cases) use the Internet or Internet-exposed private networks as their means for communicatio

Year: 2010
OAI identifier: oai:CiteSeerX.psu:10.1.1.170.4359
Provided by: CiteSeerX
Download PDF:
Sorry, we are unable to provide the full text but you may find it at the following location(s):
  • http://citeseerx.ist.psu.edu/v... (external link)
  • http://www.stsc.hill.af.mil/cr... (external link)
  • Suggested articles


    To submit an update or takedown request for this paper, please submit an Update/Correction/Removal Request.