Flylib.com
Index
Previous page
Table of content
Next page
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]
Previous page
Table of content
Next page
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
A Practitioners Guide to Software Test Design
Case Studies
Pairwise Testing
Section III - Testing Paradigms
Test Planning
Section V - Some Final Thoughts
Systematic Software Testing (Artech House Computer Library)
Risk Analysis
Analysis and Design
The Test Manager
Appendix C IEEE Templates
Appendix E Simplified Unit Test Plan
SQL Hacks
Hack 1. Run SQL from the Command Line
Hack 7. Modify a Schema Without Breaking Existing Queries
Hack 11. Convert Aggregate Subqueries to JOINs
Hack 56. Play Matchmaker
Hack 94. Create Users and Administrators
Cisco IOS Cookbook (Cookbooks (OReilly))
Booting over the Network
Filtering Routes with EIGRP
Using SNMP to Perform Mass Configuration Changes
Setting SNMP Packet Size
Checking NAT Status
Professional Struts Applications: Building Web Sites with Struts ObjectRelational Bridge, Lucene, and Velocity (Experts Voice)
The Challenges of Web Application Development
Form Presentation and Validation with Struts
Managing Business Logic with Struts
Templates and Velocity
Creating a Search Engine with Lucene
Java Concurrency in Practice
Blocking and Interruptible Methods
Stopping a Thread-based Service
Avoiding Liveness Hazards
Explicit Locks
The Java Memory Model
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies