Flylib.com
Part III: Software Vulnerabilities in Practice
Previous page
Table of content
Next page
Previous page
Table of content
Next page
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
VBScript Programmers Reference
Variables and Procedures
Error Handling and Debugging
The Scripting Runtime Objects
Appendix B Variable Naming Convention
Appendix L ActiveX Data Objects
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Basic SWT Widgets
Combos and Lists
Menus, Toolbars, Cool, Bars, and Actions
Trees
Dialogs
Cisco IP Telephony (CIPT) (Authorized Self-Study) (2nd Edition)
Summary
Introduction to Media Resources
Keys and Certificate Storage in Cisco IP Telephony
Summary
A Practitioners Guide to Software Test Design
Equivalence Class Testing
Use Case Testing
Section IV - Supporting Technologies
When to Stop Testing
Appendix A Brown & Donaldson Case Study
MySQL Clustering
Retrieving the Latest Snapshot from BitKeeper
Testing Your Cluster
SQL Nodes
Troubleshooting Backups
Data Retrieval in MySQL Cluster
The Lean Six Sigma Pocket Toolbook. A Quick Reference Guide to Nearly 100 Tools for Improving Process Quality, Speed, and Complexity
Using DMAIC to Improve Speed, Quality, and Cost
Value Stream Mapping and Process Flow Tools
Voice of the Customer (VOC)
Identifying and Verifying Causes
Complexity Value Stream Mapping and Complexity Analysis
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies