C



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Badness-ometers
Bellovin, Steve
Berkman, Ariel
Bernstein, D. J.
Best practices. [See Touchpoints]
Bibliography
     19 Deadly Sins ...
     academic literature, on bugs
     citations in this book
     government and standards publications
     "OWASP Top Ten ... Vulnerabilities,"
     required reading
     RISOS project
     software security literature
     top five publications
     vulnerabilities
Binary analysis, for security
Bishop, Matt 2nd
Black box testing
Black hat activities, touchpoints 2nd
BLAST tool
Bob
Books and publications. [See Bibliography.]
BOON tool 2nd
Breakpoint setters
Buffer Overflow phylum
Buffer overflow, described
Bugs. [See also Defects; Taxonomy of coding errors.]
     architectural risk analysis
     buffer overflow
    causes. [See Causes of problems.]
    code review. [See Code review.]
     definition
     examples
     implementation
     more lines, more bugs
     parade
     versus flaws 2nd
BugScan
BugtTraq 2nd 3rd
Building a software security program. [See Enterprise software security.]
Business context, RMF 2nd
Business-level security. [See Enterprise software security.]




Software Security. Building Security In
Software Security: Building Security In
ISBN: 0321356705
EAN: 2147483647
Year: 2004
Pages: 154
Authors: Gary McGraw

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net