DocumentCode
832948
Title
Under the Black Hat
Author
Stytz, M.R.
Author_Institution
Institute for Defense Analyses
Volume
3
Issue
3
fYear
2005
Firstpage
5
Lastpage
5
Abstract
A review of How to Break Software Security, by James A. Whittaker and Herbert H. Thompson
Keywords
Security;
fLanguage
English
Journal_Title
Security & Privacy, IEEE
Publisher
ieee
ISSN
1540-7993
Type
jour
DOI
10.1109/MSP.2005.83
Filename
1439493
Link To Document