E



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Danahy, Jack
Dangerous Functions phylum
Data Leaking Between Users phylum
Deadlock phylum
Decompilers
Defects. [See also Bugs; Flaws; Taxonomy of coding errors.]
    architectural risk analysis [See Architectural risk analysis]
    causes. [See Causes of problems.]
     definition
     design-level vulnerabilities
     error detection
     failure recovery
     fifty/fifty
     midrange vulnerabilities
     range of
Defining the risk mitigation strategy 2nd
Department of Homeland Security portal
Dependencies. [See Weakness analysis.]
Deployment and operations, software developers and information security practitioners
Design-level vulnerabilities 2nd [See also Flaws]
Destructive activities, touchpoints
Developer Desktop
DHS portal. [See Department of Homeland Security portal.]
Diagnostic knowledge
Diebold insecurity
Dilger, Mike 2nd
Directory Restriction phylum
Disassemblers
Double Free phylum
Duplicate Validation Forms phylum




Software Security. Building Security In
Software Security: Building Security In
ISBN: 0321356705
EAN: 2147483647
Year: 2004
Pages: 154
Authors: Gary McGraw

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net