Flylib.com
Part II: Software Vulnerabilities
Previous page
Table of content
Next page
Previous page
Table of content
Next page
The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities
ISBN: 0321444426
EAN: 2147483647
Year: 2004
Pages: 194
Authors:
Mark Dowd
,
John McDonald
,
Justin Schuh
BUY ON AMAZON
Inside Network Security Assessment: Guarding Your IT Infrastructure
Process for Assessing Risk
The Role Authentication, Authorization, and Accountability Play in a Secure Organization
Tools Used for Assessments and Evaluations
Preparing for Analysis
Document Tracking Form
Professional Java Native Interfaces with SWT/JFace (Programmer to Programmer)
Jump Start with SWT/JFace
Combos and Lists
Tables
SWT Graphics and Image Handling
Drawing Diagrams with Draw2D
101 Microsoft Visual Basic .NET Applications
Working with the Microsoft Visual Basic .NET Language
Data Access
Building Web Applications
Advanced .NET Framework
Visual Studio .NET
The New Solution Selling: The Revolutionary Sales Process That Is Changing the Way People Sell [NEW SOLUTION SELLING 2/E]
Chapter One Solutions
Chapter Two Principles
Chapter Fourteen Getting Started with the Process
Chapter Fifteen Sales Management System: Managers Managing Pipelines and Salespeople
Chapter Sixteen Creating and Sustaining High-Performance Sales Cultures
Special Edition Using Crystal Reports 10
Understanding Field Objects
Using Characters in Formulas
Creating Useful Report Templates
Understanding the Report Source
Introduction to the Crystal Enterprise Professional Object Model
Wireless Hacks: Tips & Tools for Building, Extending, and Securing Your Network
Hack 27. Detect Networks on Mac OS X
Hack 44. Authenticate Wireless Users
Hack 49. Poll Wireless Clients
Hack 50. Interrogate the Network
Hack 95. Build a Wireless Network for the Large House
flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net
Privacy policy
This website uses cookies. Click
here
to find out more.
Accept cookies