Vol-2808⫷ Vol-2809 ⫸Vol-2810
urn:nbn:de:0074-2809-0


Vol-2809/WESPr-18_03⫷Vol-2809/WESPr-18_04⫸Vol-2809/iMLSE-18_01-keynote

Using a variety of patterns in a secure software development methodology