[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z] back doors attack backups , tape bad code psychological factors real-world factors technical factors bad practices during design during implementation during operations Bar-Gad, Izhar Barcalow, Jeffrey bastion host Beattie, Steve Bellovin, Steven M. Bentley, Jon Bishop, Matt bit rot bit-twiddling attack black-box testing book resources bounds checking Brooks, Frederick P. 2nd buffer overflow attack buffer overflows bugs cost of fixing estimates Butler, Shawn A. |