Secure Coding[c] Principles and Practices 2003

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

late binding  

least privilege  

Lee, Cjin Pheow  

legacy application, case study  

Lodin, Steve  

logging events   2nd  

       network  

 

Категории