References

[AESRM 2005] Alliance for Enterprise Security Risk Management. “Convergence of Enterprise Security Organizations.” Booz Allen Hamilton, November 8, 2005. http://www.asisonline.org/newsroom/alliance.pdf

[Ahl 2005] Ahl, V. “An Experimental Comparison of Five Prioritization Methods.” Master’s thesis, School of Engineering, Blekinge Institute of Technology, Ronneby, Sweden, 2005.

[Alberts 2003] Alberts, Christopher J., & Dorofee, Audrey J. Managing Information Security Risks: The OCTAVESM Approach. Boston, MA: Addison-Wesley, 2003.

[Aleph One 1996] Aleph One. “Smashing the Stack for Fun and Profit.” Phrack Magazine 7, 49 (1996): file 14 of 16. http://www.phrack.org/issues.html?issue=49

[Alexander 1964] Alexander, Christopher. Notes ...

Get Software Security Engineering: A Guide for Project Managers now with the O’Reilly learning platform.

O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.