index_D

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

Daemon9  
data and data management, separating  
data cleansing  
Day, Ryab Finnin  
de Raadt, Theo  
deception, reliance on  
default accounts attack  
default actions and values  
defense, multiple layers of  
defenses against attacks  
degradation   [See graceful degradation]
democratic principles, maintaining  
denial-of-service attack   2nd  
deployment environment, analyzing  
design decisions  
design reviews  
design, good practices  
design-level attacks  
desk checks  
Dijkstra, Edgar   2nd  
Dilger, Michael  
DMZ nomenclature  
Dole, Bryn  
Du, Wenliang  
due diligence review from hell, case study  
dumping core  

 


Secure Coding[c] Principles and Practices 2003
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net