Secure Coding[c] Principles and Practices 2003

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

back doors  

       attack  

backups , tape  

bad code  

       psychological factors  

       real-world factors  

       technical factors  

bad practices

       during design  

       during implementation  

       during operations  

Bar-Gad, Izhar  

Barcalow, Jeffrey  

bastion host  

Beattie, Steve  

Bellovin, Steven M.  

Bentley, Jon  

Bishop, Matt  

bit rot  

bit-twiddling attack  

black-box testing  

book resources  

bounds checking  

Brooks, Frederick P.   2nd  

buffer overflow attack  

buffer overflows  

bugs

       cost of fixing  

       estimates  

Butler, Shawn A.  

 

Категории