index_B

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

back doors  
       attack  
backups , tape  
bad code  
       psychological factors  
       real-world factors  
       technical factors  
bad practices
       during design  
       during implementation  
       during operations  
Bar-Gad, Izhar  
Barcalow, Jeffrey  
bastion host  
Beattie, Steve  
Bellovin, Steven M.  
Bentley, Jon  
Bishop, Matt  
bit rot  
bit-twiddling attack  
black-box testing  
book resources  
bounds checking  
Brooks, Frederick P.   2nd  
buffer overflow attack  
buffer overflows  
bugs
       cost of fixing  
       estimates  
Butler, Shawn A.  

 


Secure Coding[c] Principles and Practices 2003
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net