Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Danahy, Jack Dangerous Functions phylum Data Leaking Between Users phylum Deadlock phylum Decompilers Defects. [See also Bugs; Flaws; Taxonomy of coding errors.] architectural risk analysis [See Architectural risk analysis] causes. [See Causes of problems.] definition design-level vulnerabilities error detection failure recovery fifty/fifty midrange vulnerabilities range of Defining the risk mitigation strategy 2nd Department of Homeland Security portal Dependencies. [See Weakness analysis.] Deployment and operations, software developers and information security practitioners Design-level vulnerabilities 2nd [See also Flaws] Destructive activities, touchpoints Developer Desktop DHS portal. [See Department of Homeland Security portal.] Diagnostic knowledge Diebold insecurity Dilger, Mike 2nd Directory Restriction phylum Disassemblers Double Free phylum Duplicate Validation Forms phylum |