Flylib.com
Part II: Ensuring Hack- Resistant Code
Previous page
Table of content
Next page
Chapter List:
Chapter 6: Application Attacks and How to Avoid Them
Chapter 7: Validating Input
Chapter 8: Handling Exceptions
Chapter 9: Testing for Attack-Resistant Code
Previous page
Table of content
Next page
Security for Microsoft Visual Basic .NET
ISBN: 735619190
EAN: N/A
Year: 2003
Pages: 168
BUY ON AMAZON
Metrics and Models in Software Quality Engineering (2nd Edition)
Software Quality
Reliability Models
Lessons Learned from OO Projects
Process Improvement Economics
A Project Assessment Questionnaire
MySQL Clustering
Before You Begin with MySQL Cluster
MySQL Clusters Native Backup Tool
Running MySQL in a Chrooted Environment
Physical Factors
High-Speed Interconnects
Java How to Program (6th Edition) (How to Program (Deitel))
(Optional) Software Engineering Case Study: Collaboration Among Objects
Terminology
Case Study: Payroll System Using Polymorphism
(Optional) GUI and Graphics Case Study: Drawing with Polymorphism
Welcome Files
Introduction to 80x86 Assembly Language and Computer Architecture
Branching and Looping
String Operations
Appendix C MASM 6.11 Reserved Words
Appendix D 80x86 Instructions (by Mnemonic)
Appendix E 80x86 Instructions (by Opcode)
Persuasive Technology: Using Computers to Change What We Think and Do (Interactive Technologies)
The Functional Triad Computers in Persuasive Roles
Computers as Persuasive Social Actors
Increasing Persuasion through Mobility and Connectivity
The Ethics of Persuasive Technology
Captology Looking Forward
Cisco ASA: All-in-One Firewall, IPS, and VPN Adaptive Security Appliance
Cisco ASA 5510 Model
AIP-SSM Modules
File Transfer Protocol
Deployment Scenarios
Remote System Management
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies