Partager via


A Process for Performing Security Code Reviews

I wrote an article about performing security code reviews that appears in the July/August 2006 edition of IEEE Security & Privacy. Oh, and by the way, there's a little typo in the article; my name is Michael Howard, not Michael A. Howard. Unlike almost everyone on the planet, I don't have a middle name.

Comments

  • Anonymous
    August 01, 2006
    The comment has been removed

  • Anonymous
    August 01, 2006
    So in this month's IEEE Security and Privacy magazine Michael Howard wrote an interesting article on "A Process for Performing Security Code Reviews". It's worth the read. His insights on how to prioritize what code to review first is something

  • Anonymous
    August 03, 2006
    The comment has been removed

  • Anonymous
    August 03, 2006
    Tell them you're not "Michael A Howard", you're "Michael THE Howard".

  • Anonymous
    August 03, 2006
    Occasionally, I am called upon to do a security code review. I enjoy the process and I recommend it to

  • Anonymous
    August 06, 2006
    This is what I am looking for..
    Thanks Michael.

  • Anonymous
    August 15, 2006
     
    [MSDN Subscribers Only] MSDN Subscribers Only
    Sign in today to see what's new on MSDN Subscriber...

  • Anonymous
    October 30, 2007
    Trustworthy Computing http://msdn.microsoft.com/msdnmag/issues/07/11/Lessons/default.aspxMichael HowardThis

  • Anonymous
    April 20, 2008
    When it comes to architecting server class application, following becomes very fundamental building blocks

  • Anonymous
    May 31, 2009
    PingBack from http://outdoorceilingfansite.info/story.php?id=22197

  • Anonymous
    May 31, 2009
    PingBack from http://outdoorceilingfansite.info/story.php?id=4561

  • Anonymous
    May 31, 2009
    PingBack from http://woodtvstand.info/story.php?id=11110