[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z] obfuscation obsolete code OCTAVE (Software Operationally Critical Threat, Asset, and Vulnerability Evaluations) web site off-the-shelf software one-time pad cryptographic errors online resources open source monitoring (OSM) Open Web Application Security Project (OWASP) web site 2nd operating system, securing operations bad practices case studies ensuring sound practices good practices operations-level attacks overdependence on developers |