Login / Signup
Structuring a Comprehensive Software Security Course Around the OWASP Application Security Verification Standard.
Sarah Elder
Nusrat Zahan
Val Kozarev
Rui Shu
Tim Menzies
Laurie A. Williams
Published in:
CoRR (2021)
Keyphrases
</>
network connection
database
database systems
mobile devices
access control
iso iec
security problems