Talk:Security as a service
This article is rated Start-class on Wikipedia's content assessment scale. It is of interest to the following WikiProjects: | ||||||||||||||||||||||
|
Sources
[edit]Here are some sources copied from the article:
Sams, D., & Sams, P. (2012). Software security assurance a matter of global significance: product life cycle propositions. Journal Of Technology Research, 31-9.
Hahn R, Layne-Farrar A. THE LAW AND ECONOMICS OF SOFTWARE SECURITY. Harvard Journal Of Law & Public Policy [serial online]. Fall2006 2006;30(1):283-353. Available from: Academic Search Complete, Ipswich, MA. Accessed March 19, 2013.
Chahar, C., Chauhan, V., & Das, M. (2012). Code Analysis for Software and System Security Using Open Source Tools. Information Security Journal: A Global Perspective, 21(6), 346-352. doi:10.1080/19393555.2012.727132
Howard, C. E. (2011). Safety- and security-critical avionics software. Military & Aerospace Electronics, 22(2), 20-33.
Singh, V., Sharma, Y., & Jakhar, Y. (2011). Role of Antivirus Software's in Protecting Computers against Threats to their Installed Programmes. International Journal Of Research & Reviews In Computer Science, 2(6), 1353-1356.
Jojalozzo 19:03, 14 April 2013 (UTC)
This article is shallow
[edit]The article primary consists of blabla for marketing the idea of outsourcing security. It is not even clear if this mean outsourcing of security software, security services or security management. — Preceding unsigned comment added by 217.10.52.10 (talk) 12:54, 8 February 2016 (UTC)
Origin section written partially in 2nd person?
[edit]The origin section is referring to "attacks such as DDoS that are constantly searching for access points to compromise your website". I don't think this should be written in the second person, as I think in all the articles I've seen so far, all were in third person.
--82.33.245.66 (talk) 10:52, 22 February 2016 (UTC)
Shallowness and second person
[edit]You are both right. This is the typical appalling marketing blabla. I have struck a first blow against it. More improvements yet required. -- Kku 10:08, 19 December 2016 (UTC)
- Start-Class Computing articles
- Low-importance Computing articles
- Start-Class Computer networking articles
- Low-importance Computer networking articles
- Start-Class Computer networking articles of Low-importance
- All Computer networking articles
- Start-Class Computer Security articles
- Mid-importance Computer Security articles
- Start-Class Computer Security articles of Mid-importance
- All Computer Security articles
- All Computing articles