1 |
Symantec, Internet Security Threat report, 2011 Trends, Vol. 17, April 2012
|
2 |
Microsoft, Benefits of SDL, https://www.microsoft.com/en-us/SDL/about/benefits.aspx,
|
3 |
Chisholm, G.H, et al, Peer Review of the Trusted Software Methodology, Argonne National Laboratory, 1994
|
4 |
Build Security In, buildsecurityin.us-cert.gov, US-CERT
|
5 |
Software Assurance Landscape. Dept of Homeland Security, August 2006
|
6 |
BSIMM6, http://www.BSIMM.com, 2015
|
7 |
안전행정부, 소프트웨어 개발보안 가이드, 2013
|
8 |
G. Mcgraw, Software Security: Building Security In, Addison-Wesley, 2006
|
9 |
M Karen, et al. A Twenty-five Year Perspective, CrossTalk, July pp8-15,2013
|