共 17 条
- [1] Adkins H., Beyer B., Blankinship P., Lewandowski P., Oprea A., Stubblefield A., Building Secure and Reliable Systems: Best Practices for Designing, Implementing, and Maintaining Systems., (2020)
- [2] Corbett J.C., Dean J., Epstein M., Fikes A., Frost C., Furman J.J., Ghemawat S., Gubarev A., Heiser C., Hochschild P., Et al., Spanner: Google's globally distributed database, Acm Transactions on Computer Systems, 31, 3, pp. 1-22, (2013)
- [3] Stubborn Weaknesses in the Cwe Top 25, (2023)
- [4] Top 25 Most Dangerous Software Weaknesses, (2023)
- [5] Czapinski M., Wolafka R., Zero Touch Prod: Towards Safer and More Secure Production Environments., (2019)
- [6] Kern C., Securing the tangled web, Communications of the Acm, 57, 9, pp. 38-47, (2014)
- [7] Kotowicz K., Trusted Types, (2024)
- [8] Leveson N., A Systems Approach to Safety and Cybersecurity., (2019)
- [9] Nokleberg C., Hawkes B., Application frameworks, Communications of the Acm, 64, 7, pp. 42-49, (2021)
- [10] Owasp Top Ten