Secure Coding[c] Principles and Practices 2003

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

identity  

implementation  

       bad practices  

       flaw  

       good practices  

implementation-level attacks  

incident response plans  

independent verification and validation (IV&V)   2nd  

initial values and clearing memory  

Institute for Security and Open Methodologies web site  

International Systems Security Engineering Association (ISSEA) web site  

interposition  

       as an alternative to wrappers  

intrusion detection systems (IDS)   2nd  

 

Категории