A Process for Performing Security Code Reviews
I wrote an article about performing security code reviews that appears in the July/August 2006 edition of IEEE Security & Privacy. Oh, and by the way, there's a little typo in the article; my name is Michael Howard, not Michael A. Howard. Unlike almost everyone on the planet, I don't have a middle name.
Comments
Anonymous
August 01, 2006
The comment has been removedAnonymous
August 01, 2006
So in this month's IEEE Security and Privacy magazine Michael Howard wrote an interesting article on "A Process for Performing Security Code Reviews". It's worth the read. His insights on how to prioritize what code to review first is somethingAnonymous
August 03, 2006
The comment has been removedAnonymous
August 03, 2006
Tell them you're not "Michael A Howard", you're "Michael THE Howard".Anonymous
August 03, 2006
Occasionally, I am called upon to do a security code review. I enjoy the process and I recommend it toAnonymous
August 06, 2006
This is what I am looking for..
Thanks Michael.Anonymous
August 15, 2006
 
[MSDN Subscribers Only] MSDN Subscribers Only
Sign in today to see what's new on MSDN Subscriber...Anonymous
October 30, 2007
Trustworthy Computing http://msdn.microsoft.com/msdnmag/issues/07/11/Lessons/default.aspxMichael HowardThisAnonymous
April 20, 2008
When it comes to architecting server class application, following becomes very fundamental building blocksAnonymous
May 31, 2009
PingBack from http://outdoorceilingfansite.info/story.php?id=22197Anonymous
May 31, 2009
PingBack from http://outdoorceilingfansite.info/story.php?id=4561Anonymous
May 31, 2009
PingBack from http://woodtvstand.info/story.php?id=11110