Secure Coding[c] Principles and Practices 2003

 
[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [Y] [Z]

Maganty, Vivekananda  

Maguire, Steve  

maliciousness  

man-in-the-middle attack  

Mayan temple model  

McConnell, Steve   2nd  

McGraw, Gary   2nd   3rd  

mental model  

       Mayan temple example  

       use of  

metaphors that assist in designing security  

metrics and security  

Miller, Barton P.   2nd  

Miller, Todd C.  

mission creep  

modularizing  

       case study  

Montgolfiers versus Wrights  

mouse driver security, case study  

Mudge  

multilevel security (MLS)  

multiple layers of security, deploying  

Murthy, Ravi  

 

Категории