Sign In
Sign Up
The security development lifecycle
Steve Lipner
Michael Howard
Michael Howard
2006
-
/
5
0 votes
Computer Software
Network Security
Development
Clean Code
4.4
35 votes
Code Complete
4.2
22 votes
The Cathedral and the Bazaar
4.3
16 votes
Hackers
4.1
21 votes
Don't Make Me Think
4.1
15 votes
Design Patterns
3.9
30 votes
Ghost in the wires
4.1
17 votes
Microserfs
4.0
18 votes
Masters of Doom
4.1
32 votes
Cryptonomicon
4.5
28 votes
The Code Book
4.0
35 votes
Hackers & painters
4.0
16 votes
To have and to hold
3.8
18 votes
For adults only
4.1
15 votes
Sensation
3.9
27 votes
When the Loving Stopped
3.5
20 votes
Rhys's Redemption
4.2
16 votes
Their wedding day
4.5
15 votes
Breaking Point
4.5
18 votes
Marriage Meltdown
4.1
19 votes
The Mythical Man-Month
4.2
28 votes
The Manager's Path
4.3
15 votes
A Fiery Baptism
4.2
16 votes
Dearest traitor
3.9
16 votes
To Woo a Wife
4.0
16 votes
A Secret Understanding
4.0
18 votes
The Millionaire's Mistress
3.9
17 votes
An Ideal Marriage?
3.6
15 votes
The Mistress Wife
3.3
18 votes
The Wayward Wife
3.9
16 votes
The Soul of a New Machine
4.1
15 votes
JavaScript
4.1
30 votes
The High-Society Wife
3.9
15 votes
The Blackmail Baby
3.5
19 votes
A Most Passionate Revenge
4.1
18 votes
Gold Ring of Betrayal
4.1
15 votes
Forgotten Husband
3.7
16 votes
Ultimate Betrayal
4.5
20 votes
Rogue protocol
4.2
66 votes
The Kindly Ones
4.5
22 votes
Sarah's Child
4.0
21 votes
Slave to Love
3.2
26 votes
A Summer Storm
3.1
15 votes
Structure and Interpretation of Computer Programs (SICP)
4.4
21 votes
Adulthood Is A Myth
4.1
21 votes
Stellaluna
4.4
107 votes
Coders at Work
4.0
18 votes
Code
4.3
21 votes