J



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Jaa, Tony
Java Database Connectivity (JDBC)
Java servlets 2nd
     configuration settings
     cross-site scripting
     file access
     file inclusion
     inline evaluation
     JSP file inclusion
     shell invocation
     SQL injection queries
     threading
     Web server APIs versus
Java Virtual Machine (JVM)
JavaScript Object Notation (JSON)
JavaServer Pages (JSP) 2nd
     file inclusion
JDBC (Java Database Connectivity)
Johanson, Eric
Johnson, Nick
JSON (JavaScript Object Notation)
JSP (JavaServer Pages) 2nd
     file inclusion
jump locations, signals
junction points, Windows NT files
     arbitrary file accesses
     race conditions
     TOCTTOU (time of check to time of use)
JVM (Java Virtual Machine)




The Art of Software Security Assessment. Identifying and Preventing Software Vulnerabilities
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net