소프트웨어 생명주기에서의 설계문서에 대한 보안성 체크리스트

The Korea Institute of Information Security and Cryptology, Vol. 16, No. 4, pp. 59-68, 8월. 2006
Full Text:

Statistics
Show / Hide Statistics

Statistics (Cumulative Counts from December 1st, 2017)
Multiple requests among the same browser session are counted as one view.
If you mouse over a chart, the values of data points will be shown.


Cite this article
[IEEE Style]
S. Kyung-Ho, K. Seung-Joo, W. Dong-Ho, "nan," The Korea Institute of Information Security and Cryptology, vol. 16, no. 4, pp. 59-68, 2006.

[ACM Style]
Son Kyung-Ho, Kim Seung-Joo, and Won Dong-Ho. 2006. nan. The Korea Institute of Information Security and Cryptology, 16, 4, (2006), 59-68.