LOGIN TO YOUR ACCOUNT

Username
Password
Remember Me
Or use your Academic/Social account:

CREATE AN ACCOUNT

Or use your Academic/Social account:

Congratulations!

You have just completed your registration at OpenAire.

Before you can login to the site, you will need to activate your account. An e-mail will be sent to you with the proper instructions.

Important!

Please note that this site is currently undergoing Beta testing.
Any new content you create is not guaranteed to be present to the final version of the site upon release.

Thank you for your patience,
OpenAire Dev Team.

Close This Message

CREATE AN ACCOUNT

Name:
Username:
Password:
Verify Password:
E-mail:
Verify E-mail:
*All Fields Are Required.
Please Verify You Are Human:
fbtwitterlinkedinvimeoflicker grey 14rssslideshare1
Glisson, W.B.; Glisson, L.M.; Welland, R. (2006)
Languages: English
Types: Other
Subjects: QA75
Protection of data, information, and knowledge is a hot topic in today’s business environment. Societal, legislative and consumer pressures are forcing companies to examine business strategies, modify processes and acknowledge security to accept and defend accountability. Research indicates that a significant portion of the financial losses is due to straight forward software design errors. Security should be addressed throughout the application development process via an independent methodology containing customizable components. The methodology is designed to integrate with an organization’s existing software development processes while providing structure to implement secure applications, helping companies mitigate hard and soft costs.
  • The results below are discovered through our pilot algorithms. Let us know how we are doing!

    • International Edition ed. c2003, Boston: MacGraw-Hill. 121-139.
    • Berinato, S., The Bugs Stop Here, in CIO. c2003.
    • 12/06/2005. http://www.bzmedia.com/pr/pr20041123.htm Clancy, H., ISS Service Helps Users Comply With Fed Laws. April 11, 2004.
    • http://www.crn.com/sections/breakingnews/breakingnews.jhtml;jsessionid=SATRZS0JDIIZ2QSNDBCCKH0CJUMEKJVN?articleId=44585&_r equestid=475222 Consumer Privacy Guide, Financial Modernization Act (Gramm-Leach-Bliley Act). April 11, 2005. http://www.consumerprivacyguide.org/law/glb.shtml Dacey, R. F., INFORMATION SECURITY Effective Patch Management is Critical to Mitigating Software Vulnerabilities, in Testimony Before the Subcommittee on Technology, Information Policy, Intergovernmental Relations, and the Census, House Committee on Government Reform.
    • c2003, United States General Accounting Office.
    • Deloitte, 2004 Global Security Survey. c2004: London. p. 1-36.
    • Deloitte, Security Attacks On IT Systems More Than Double, According to Respondents of Deloitte & Touche LLP's Global Financial Services Survey. April 11, 2005.
    • http://www.deloitte.com/dtt/press_release/0,1014,sid%253D2283%2526cid%253D50024,00.html Department of Justice USA, Computer Crime and Intellectual Property Section (CCIPS).
    • 12/06/2005. http://www.usdoj.gov/criminal/cybercrime/ipmanual/08ipma.htm#VIII.C.3.
    • Deshpande, Y. Web Engineering Curriculum: A Case Study of an Evolving Framework. in Web Enginering 4th international conference, ICE 2004. c2004. Munich, Germany.
    • Deshpande, Y., Murugesan, S., Ginige, A., Hansen, S., Schwabe, D., Gaedke, M. and White, B., Web Engineering. Journal of Web Engineering, c2002. 1(No. 1): p. 3-17.
    • Dickson, J. B., Web applications have become IT's next security battleground. San Antonio Business Journal, c2004.
    • Carrasco, E. c2001., San Diego: Academic Press. 1-320.
    • Fingar, P. and Aronica, R., The Death of "e" and the Birth of the Real New Economy: Business Models, Technologies and Strategies for the 21st Century. c2001, Tampa, Florida USA: Meghan-Kiffer Press. 82.
    • Freedman, R., The econsultant : guiding clients to Net success. c2001., San Francisco :: JosseyBass/Pfeiffer,. xviii, 254 p. :.
    • Glass, R. L., Facts and Fallacies of Software Engineering. c2003, Boston, USA: AddisonWesley.
    • Glisson, W. B. and Welland, R. Web Development Evolution: The Assimilation of Web Engineering Security. in 3rd Latin American Web Congress. c2005. Buenos Aires - Argentina: IEEE CS Press.
    • Gordon, L. A., Loeb, M. P., Lucyshyn, W. and Richardson, R., 2004 CSI/FBI Computer Crime Security Survey. c2004, Computer Security Institute. p. 2-18.
    • Graff, M. G. and Wyk, K. R. v., Secure Coding Principles & Practices, (ed). Russell, D. c2003, Sebastopol, CA: O'Reilly & Associates Inc. 1-183.
    • Gross, G., Secret Service head calls for cybersecurity cooperation. 20/05/2005.
    • http://www.computerworld.com/securitytopics/security/story/0,10801,101820,00.html?SKC=security-101820 Hansche, S., Berti, J. and Hare, C., Official (ISC)2 Guide to the CISSP Exam. c2004, Boca Raton: Auerbach Publications.
    • Hare, C., Policy Development, in Information Security Managment Handbook, Tipton, H.F. and Krause, M., (eds). c2004, Auerbach Publications: Boca Raton. p. 925-943.
    • Hoo, K. S., Sudbury, A. W. and Jaquith, A. R., Tangible ROI through Secure Software Engineering. Secure Business Quarterly, c2001. 1(2).
    • Hopper, D. I. and Bridis, T., Information Security News: Microsoft announces corporate strategy shift toward security and privacy. July 1, 2005. http://seclists.org/lists/isn/2002/Jan/0092.html Howard, P. D., The Security Policy life Cycle: Functions and Responsibilities, in Information Security Managment Handbook, Tipton, H.F. and Krause, M., (eds). c2004, Auerbach Publications: Boca Raton.
    • Hurley, E., Security and Sarbanes-Oxley. April 11, 2005.
    • http://searchsecurity.techtarget.com/originalContent/0,289142,sid14_gci929451,00.html Jelassi, T., Strategies for e-Business. c2005, Harlow, England: Prentice Hall.
    • Lee, Y. L., Software Security at the Summit. 09/06/2005. http://www.sdtimes.com/article/story-20050301-12.html McCullagh, D., Senators propose sweeping data-security bill. July 01, 2005. http://news.zdnet.com/2100- 1009_22-5769156.html Mimoso, M. S., Top Web application security problems identified SearchSecurity.com. April 12,
  • No related research data.
  • No similar publications.

Share - Bookmark

Download from

Cite this article