G



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Gates, Bill
GATEWAY_INTERFACE (environment variable)
gateways
     system call gateways
GECOS field, UNIX
general CP (candidate point) strategy, code audits
generalization approach, application review
GET method 2nd
get_mac( ) function
get_string_from_network( ) function
get_user( ) function
GetCurrentProcess( ) function
GetFullPathName( ) Call in Apache 2.2.0 listing (8-14)
GetFullPathName( ) function
GetLastError( ) function 2nd
GetMachineName( ) function
getrlimit( ) function
GIDs (group IDs), UNIX 2nd
global namespaces, Windows NT
global overflows
globbing characters, UNIX programs, indirect invocation
GNU/Linux
Govindavajhala, Sudhakar
Greenman, David
group ID functions (UNIX)
group IDs (GIDs), UNIX
     functions
group lists, Windows NT sessions, SIDs
groups, UNIX
     effective groups
     file security
     GIDs (group IDs) 2nd 3rd
     login groups
     primary groups
     privilege vunerabilities
     process groups
     real groups
     saved set groups
     secondary groups
     setgid (set-group-id)
     supplemental groups 2nd
Guninski, Giorgi 2nd




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net