K. Beck, Manifesto for Agile Software Development Online article at: www.agilemanifesto.org, 2001.

S. Harris, CISSP All-in-One Exam Guide, Sixth Edition, 2013.

P. Institute, Understaffed and at Risk: Today's IT Security Department, 2014.

I. Iso and . Iec, 2013 -Information technology ? Security Techniques ? Information security management systems ? Requirements, 2013.

R. Kissel, Security Considerations in the System Development Life Cycle ? NIST Special Publication 800-64, Rev. 2, National Institute of Standards and Technology, 2008.

N. M. Munassar and A. A. Govardhan, A Comparison between Five Models of Software Engineering, Int. Journal of Computer Science Issues (IJCSI), vol.7, issue.5, 2010.

E. Oftedal, Leveraging agile to gain better security: An agile developer's perspective, OWASP AppSec Europe, 2009.

M. Pascal, Handbook of Science and Technology for Homeland Security, Classes of vulnerabilities and attacks, 2007.

N. Perlroth, A Tough Corporate Job Asks One Question: Can You Hack It, 2014.

J. Stephen and . Ross, Whiz Bang, ISACA Journal, vol.6, 2000.

D. Wichers, Breaking the Waterfall Mindset of the Security Industry, OWASP AppSec USA, 2008.