원문정보
피인용수 : 0건 (자료제공 : 네이버학술정보)
목차
Abstract
1. Introduction
2. Methodologies
2.1. Secunity Overlay
2.2. Physical
2.3. Target Harlening
3. Security Design Guidelines for Applications
3.1. Architecture and Design Issuers for Web Applications
3.2. Deployment Considerations
4. Security Architecture and Design Review
5. List of Security Engineering Training and Certification Programs
5.1. Programs Primanily Focused on Secure Softw are Development
6. Conclusion
References
1. Introduction
2. Methodologies
2.1. Secunity Overlay
2.2. Physical
2.3. Target Harlening
3. Security Design Guidelines for Applications
3.1. Architecture and Design Issuers for Web Applications
3.2. Deployment Considerations
4. Security Architecture and Design Review
5. List of Security Engineering Training and Certification Programs
5.1. Programs Primanily Focused on Secure Softw are Development
6. Conclusion
References
저자정보
참고문헌
자료제공 : 네이버학술정보
