Registro 1 de 1, Base de información BIBCYT
IEEE Software
Sept/Oct 2000
|
Referencias Analíticas
*
Wisdom: A Software Engineering Method for Small Software Development Companies
Nunes, Nuno J.
Cunha , Joăo F.
(Compilador) Pag. 113-119
|
*
When to Test Less
Menzies, Tim
; Cukic , Bojan
Pag.107-112
|
*
What's in a Name?
McConnell , Steve
Pag.7-9
|
*
The Legal Tortoise and the Technology Hare
Graham , Larry
Pag. 18-19
|
*
The Generalization of an Application Domain
Glass , Robert L.
Pag. 128, 127
|
*
Statically Scanning Java Code: Finding Security Vulnerabilities
Viega, John
; McGraw, Gary
; Mutdosch, Tom
; Felten, Edward W.
Pag. 68-74
|
*
Security Domains: Key Management in Large-Scale Systems
Michener, John R.
; Acar, Tolga
pp. 52-58
|
*
Safe and Simple Software Cost Analysis
Boehm, Barry
pp.14-17
|
*
Remediation of Application-Specific Security Vulnerabilities at Runtime
Bowen, Thomas F.
; Segal, Mark E.
pp. 59-67
|
*
Making Telecommuting Work
Rothman, Johanna
pp. 124-126
|
*
Incremental Redocumentation Using the Web
Rajlich, Václav
pp. 102-106
|
*
Improvisation in Small Software Organizations
Dybĺ, Tore
pp. 82-87
|
*
Guest Editors' Introduction: Software Engineering in the Small
Laitinen, Mauri
; Fayad, Mohamed
; Ward, Robert
pp. 75-77
|
*
Guest Editor's Introduction: Malicious IT
Voas, Jeffrey
; Mead , Nancy
pp. 23-25
|
*
Defending Yourself: The Role of Intrusion Detection Systems
McHugh, John
; Christie, Alan
; Allen, Julia
pp. 42-51
|
*
Can Chaotic Methods Improve Software Quality Predictions?
Voas, Jeffrey
pp. 20-22
|
*
Attacking Malicious Code: A Report to the Infosec Research Council
McGraw, Gary
; Morrisett, Greg
pp. 33-41
|
*
Applying Product Line Concepts in Small and Medium-Sized Companies
Knauber, Peter
; Schmid, Klaus
; Muthig, Dirk
; Widen, Tanya
pp. 88-95
|
*
A Software Development Process for Small Projects
Russ, Melissa L.
McGregor, John D.
(Traductor) pp. 96-101
|
|