![]() |
Sponsored Link •
|
Artima Weblogs
Thinking Aloud A Weblog by Johan Peeters |
|
![]() Johan Peeters is an independent software architect.
Artima Bloggers
Aahz Jans Aasman B. Scott Andersen Eric Armstrong Ken Arnold Dale Asberry Dave Astels Arash Barirani Matt Bauer Charles Bell Berco Beute Geert Bevin Nitin Borwankar Vladimir Ritz Bossicard Rahul Chaudhary Bob Clancy James O. Coplien Ward Cunningham Andy Dent Christopher Diggins Bruce Eckel Ted Farrell Michael Feathers Elisabeth Freeman Eric Freeman Matt Gerrans David Goodger Gabe Grigorescu Rix Groenboom Cees de Groot Philipp Haller Peter Hansen David Heinemeier Hansson Kevlin Henney Steve Holden Cay Horstmann Ron Jeffries Mark Johnson Greg Jorgensen Heinz Kabutz Rick Kitts Kirk Knoernschild Andrew Koenig Klaus Kreft Sean Landis Angelika Langer Jakob Eg Larsen Josh Long Howard Lovatt Robert C. Martin John McClain Eamonn McManus Jeremy Meyer John D. Mitchell Brian Murphy Sean Neville Nancy Nicolaisen Martin Odersky Vlad Patryshev Johan Peeters Carlos Perez Ken Pugh Eric S. Raymond Ian Robertson Guido van van Rossum Alberto Savoia Jerome Scheuring Richard Hale Shaw Calum Shaw-Mackay Jack Shirazi Michele Simionato Van Simmons Frank Sommers Bruno Souza Sue Spielman Bill Venners David Vydra Jim Waldo Dick Wall Barry Warsaw Mark Williamson Matthew Wilson Gregg Wonderly Kevin Wright |
1 page [ 1 ]
March 6, 2011,
![]()
Chris Wysopal likens application security debt to technical debt in a couple of recent blog posts. It turns out that the debt metaphor is particularly apt as, like financial debt, application security debt is susceptible to interest rate fluctuations.
April 3, 2007,
![]()
At last week's SPA conference, Paul Dyson and I ran a workshop on planning non-functional requirements in agile projects. Here is a personal account.
June 2, 2006,
![]()
Not by angry customers suing for damages after security breaches, or by governments breaking up monopolies, but by open source developers and security professionals accusing them of being obsessed by security.
May 16, 2006,
![]()
The ICT security community is suspicious of agile processes. "They do not produce formal documentation" is an often-heard complaint. Agile developers, on the other hand, blithely ignore security concerns.
June 5, 2005,
![]()
Agile iteration planning has traditionally maximized business value based exclusively on user stories.
However, implementing a user story increases the attack surface of a system and consequently the risk of abuse.
The cost of absorbing such risk is often not taken into account.
Abuser stories redress the balance.
March 1, 2005,
![]()
Security is a blind spot in application development.
January 8, 2005,
![]()
Security professionals have long regarded agile development processes with suspicion, in spite of their reputation for improving software quality. I report on a panel discussion at JavaPolis confronting agile processes with security engineering.
December 24, 2004,
![]()
Eamonn McManus beat me to blogging about JavaPolis on Artima. I add a little sprinkling of Trust and Sex.
August 16, 2004,
![]()
How do you get rid of a mainframe? Don't let it become a monster that feeds off your fears.
February 28, 2004,
![]()
JavaScript is not as innocuous as some would like to believe.
February 25, 2004,
![]()
XSS has been around for a long time, but the current appetite for weblogs opens up new opportunities for attackers.
November 11, 2003,
![]()
A trailer for the security track at JavaPolis featuring O.S. security semantics in language-based systems, JAAS and auditing.
1 page [ 1 ]
|
Sponsored Links
|