

Publisher: IGI Global_journal
E-ISSN: 1947-3044|5|3|32-55
ISSN: 1947-3036
Source: International Journal of Secure Software Engineering (IJSSE), Vol.5, Iss.3, 2014-07, pp. : 32-55
Disclaimer: Any content in publications that violate the sovereignty, the constitution or regulations of the PRC is not accepted or approved by CNPIEC.
Abstract
Related content








By Moløkken Kjetil Jørgensen Magne
Empirical Software Engineering, Vol. 10, Iss. 1, 2005-01 ,pp. :


Building Secure Software Using XP
International Journal of Secure Software Engineering (IJSSE), Vol. 2, Iss. 3, 2011-07 ,pp. :