共查询到20条相似文献,搜索用时 15 毫秒
1.
3.
Gary McGraw 《Datenschutz und Datensicherheit - DuD》2012,36(9):662-665
Software security is the idea of engineering software so that it continues to function correctly under malicious attack. Plenty of progress has been made in the field of software security since its inception in 2001. A number of best practices including the Touchpoints have been identified and put into common use. In addition, the BSIMM1 project has devised a way to measure and compare large scale software security initiatives. 相似文献
4.
俞文伟 《计算机光盘软件与应用》2011,(14)
二十世纪九十年代以来,以互联网为核心信息时代到来,信息社会出现,信息安全使传统保密工作条件、内容和方式发生变化,我们在新挑战下,必须重新定位保密与信息安全工作,应用新时代保密技术手段为中国大飞机事业保驾护航。 相似文献
5.
Paul S. Hoffman 《Information Systems Management》1985,2(1):3-6
Because the software industry is undergoing an accelerated rate of development, contract standardization is difficult, and contracts are frequently inconsistent. The MIS manager can contend with these discrepancies by understanding the fundamental software contract provisions and by protecting the rights of the organization while respecting the legitimate concerns of the software vendor. 相似文献
6.
7.
8.
《Pervasive Computing, IEEE》2006,5(4):4-6
First, the phenomenon of blogging changed the rules for online publishing. Now, podcasting has opened the world of online broadcasting to anyone with a PC, a microphone, and a net connection. Don't be mistaken, podcasting, which gets its name from a combination of broadcasting and the Apple iPod, isn't just for fun and games. You can find plenty of podcasts focused on music, talk-radio style banter, and humor, but podcasts also now serve key purposes for news organizations, businesses, and even politicians trying to connect with voters. Furthermore, they're making news in education, especially in universities with the resources and funding to support early applications 相似文献
9.
Mendel J.M. Zadeh L.A. Trillas E. Yager R. Lawry J. Hagras H. Guadarrama S. 《Computational Intelligence Magazine, IEEE》2010,5(1):20-26
Computing with words (CWW) means different things to different people. This article is the start of a position paper, written by some of the members of the CIS Fuzzy Systems Technical Committee Task Force on CWW, that answers the question What does CWW mean to me? 相似文献
10.
XIA Yi-fan 《数字社区&智能家居》2008,(29)
在现在的商业软件开发领域,越来越多的公司使用J2EE架构来开发商用软件。J2EE架构有很多自身的优势。在J2EE架构所包含的众多技术中,如何选择合适与应用的技术来使我们的软件开发达到最好的效果是一个很值得研究的问题。有些开发人员倾向于使用最新的技术,但是在很多情况下我们应该根据项目的具体情况选择技术。该文用一个真实的商用软件开发来展示如何根据项目需求在有限资源下帮助项目达到最大的效率。 相似文献
11.
主要阐述了利用Windows界面下的VC++6.0可视化应用软件实现IP-VPN网关管理,设计出了Windows界面下的应用软件,同时在Linux下利用GCC编辑器,以实现Linux对Windows管理软件作出响应的相应操作和IP-VPN管理中的部分内容。 相似文献
12.
13.
14.
Increasingly short software development cycles have forced software companies and engineers to strike a balance between informal development--in Internet-time--and more traditional agile and plan-driven methods. The authors review six common practices and how they are blended to maximize time-sensitive development. 相似文献
15.
《Information Security Journal: A Global Perspective》2013,22(4):226-236
ABSTRACT This article describes how to adapt a specific part of the Rational Unified Process (RUP) framework for the purpose of conducting requirements gathering for software projects aimed at adding security features to legacy software. The RUP seems particularly fitting for this purpose because it aggregates numerous software engineering terms into a common body of knowledge and strives to give them clear and unambiguous semantics. Furthermore, the RUP allows project coordinators to pick and choose only the process elements best suited to meet the particular needs of a project. The article should prove useful to project managers, process engineers, and software architects responsible for teaching old software new security functions. It should also prove useful to organizations that have already carried out basic software security projects such as those that fix buffer overflows, teach the software to perform better data validation, replace unsafe string handling functions, and recompile code with safe exception handling. This article covers only a small and very specific part of the RUP. It interprets the RUP in ways guided by the author's experience and specializes the Requirements discipline for use in projects tasked with adding new security features to legacy software. 相似文献
16.
David Duke 《Computer Fraud & Security》2002,2002(5):13
With its recent name and shame policy the Business Software Alliance (BSA) has clearly signalled a change in the way software piracy by the business community is perceived. It must be acknowledged that in the vast majority of cases businesses are NOT purposely setting out to defraud the software producers! 相似文献
17.
18.
Microsoft's release of Windows Vista marks the arrival of a new era for software security. Fundamental changes have gradually occurred, bringing us to a point now where the threat landscape no longer resembles what it was just a few years ago. Vista's release is ideal to consider as a culmination point; it's from here that software attack strategies will move into new directions. In this article, the author examines some of these new directions, as well as some of the changes related to Vista that most encapsulate the current threat landscape for software security. Eight characterirstics most strongly define the new software security threat landscape. Let's take a look at them: actualization of Web vulnerability threats; advances in code analysis; more advanced techniques; client-side vulnerabilities; remote exploitation; targeted attacks; sale of vulnerability information; and anti-exploitation technology. 相似文献
19.
We describe a software security portal, created under the guidance of the US Department of Homeland Security by the Software Engineering Institute and Cigital. 相似文献