The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Jaa, Tony

Java Database Connectivity (JDBC)

Java servlets 2nd

     configuration settings

     cross-site scripting

     file access

     file inclusion

     inline evaluation

     JSP file inclusion

     shell invocation

     SQL injection queries

     threading

     Web server APIs versus

Java Virtual Machine (JVM)

JavaScript Object Notation (JSON)

JavaServer Pages (JSP) 2nd

     file inclusion

JDBC (Java Database Connectivity)

Johanson, Eric

Johnson, Nick

JSON (JavaScript Object Notation)

JSP (JavaServer Pages) 2nd

     file inclusion

jump locations, signals

junction points, Windows NT files

     arbitrary file accesses

     race conditions

     TOCTTOU (time of check to time of use)

JVM (Java Virtual Machine)

Категории