HCSS 2008

file

Visible to the public Predicting Where Software Systems will be Attacked

file

Visible to the public Security as a System-Level Constraint

file

Visible to the public From Dirt to Shovels

file

Visible to the public COTS Strategy