Index[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z] Kernel vulnerabilities 2nd KillerAppCo. [See RMF, example.] Kingdoms. [See Taxonomy of coding errors, kingdoms.] Knowledge attack patterns 2nd Department of Homeland Security portal description diagnostic knowledge experience expertise exploits 2nd guidelines 2nd historical knowledge historical risks 2nd hurdles to overcome in the touchpoint process knowledge catalogs 2nd 3rd prescriptive knowledge principles 2nd 3rd rules 2nd 3rd vulnerabilities 2nd Knowledge base, Fortify Knowledge catalogs 2nd 3rd Knowledge requirements, architectural risk analysis Kocher, Paul |