N



Index


[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Malicious input
Management without measurement
Measurement
     importance of
     metrics in the RMF
     metrics program
     ROI (return on investment)
Memory Leaks phylum
Metrics. [See Measurement.]
Microsoft
     Bob
     Gates memo
     high-level commitment [See also Gates memo.]
     Nomenclature problems
     SDL (Secure Development Lifecycle)
     threat modeling versus risk analysis
     Trustworthy Computing initiative
Missing Access Control phylum
Missing Custom Error Handler phylum
Missing Error Handling phylum
Misuse cases. [See Abuse cases.]
Mitigation strategies
     defining 2nd
     penetration testing
     risks 2nd
     RMF
MLOCs3
MLOCs3^2+1
Mobile Code phylum
Mobile code, and extensibility
Monitor tools
MOPS tool
"More lines, more bugs,"
Moving left
Multithreading




Software Security. Building Security In
Software Security: Building Security In
ISBN: 0321356705
EAN: 2147483647
Year: 2004
Pages: 154
Authors: Gary McGraw

flylib.com © 2008-2017.
If you may any questions please contact us: flylib@qtcs.net