index_M

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

Maganty, Vivekananda  
Maguire, Steve  
maliciousness  
man-in-the-middle attack  
Mayan temple model  
McConnell, Steve   2nd  
McGraw, Gary   2nd   3rd  
mental model  
       Mayan temple example  
       use of  
metaphors that assist in designing security  
metrics and security  
Miller, Barton P.   2nd  
Miller, Todd C.  
mission creep  
modularizing  
       case study  
Montgolfiers versus Wrights  
mouse driver security, case study  
Mudge  
multilevel security (MLS)  
multiple layers of security, deploying  
Murthy, Ravi  

 


Secure Coding[c] Principles and Practices 2003
Secure Coding[c] Principles and Practices 2003
ISBN: 596002424
EAN: N/A
Year: 2004
Pages: 81

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net