Date: 2015-01-21 19:48:40Computer network security Software testing Hacking Vulnerability Cross-site scripting SQL injection Code review Software bug Penetration test Computer security Cyberwarfare Computing | | An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USAAdd to Reading ListSource URL: www.cs.berkeley.eduDownload Document from Source Website File Size: 305,02 KBShare Document on Facebook
|