Secure Coding[c] Principles and Practices 2003

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

Daemon9  

data and data management, separating  

data cleansing  

Day, Ryab Finnin  

de Raadt, Theo  

deception, reliance on  

default accounts attack  

default actions and values  

defense, multiple layers of  

defenses against attacks  

degradation   [See graceful degradation]

democratic principles, maintaining  

denial-of-service attack   2nd  

deployment environment, analyzing  

design decisions  

design reviews  

design, good practices  

design-level attacks  

desk checks  

Dijkstra, Edgar   2nd  

Dilger, Michael  

DMZ nomenclature  

Dole, Bryn  

Du, Wenliang  

due diligence review from hell, case study  

dumping core  

 

Категории