1. Software vulnerability guide

by Thompson, Herbert H | Chase, Scott G.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Hingham: Charles River Media, 2005Availability: Items available for loan: [Call number: 005.8 THO] (2).
2. Secure programming with static analysis

by Chess, Brian.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: New Jersey: Addison-Wesley, 2007Availability: Items available for loan: [Call number: 005.8 CHE] (2).
3. Security development lifecycle

by Howard, Michael | Lipner, Steve.

Material type: book Book; Format: print ; Literary form: Not fiction Publisher: Washington: Microsoft Press, 2006Availability: Items available for loan: [Call number: 005.8 HOW] (2).

Powered by Koha