Software Security: Building Security In

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Badness-ometers

Bellovin, Steve

Berkman, Ariel

Bernstein, D. J.

Best practices. [See Touchpoints]

Bibliography

     19 Deadly Sins ...

     academic literature, on bugs

     citations in this book

     government and standards publications

     "OWASP Top Ten ... Vulnerabilities,"

     required reading

     RISOS project

     software security literature

     top five publications

     vulnerabilities

Binary analysis, for security

Bishop, Matt 2nd

Black box testing

Black hat activities, touchpoints 2nd

BLAST tool

Bob

Books and publications. [See Bibliography.]

BOON tool 2nd

Breakpoint setters

Buffer Overflow phylum

Buffer overflow, described

Bugs. [See also Defects; Taxonomy of coding errors.]

     architectural risk analysis

     buffer overflow

    causes. [See Causes of problems.]

    code review. [See Code review.]

     definition

     examples

     implementation

     more lines, more bugs

     parade

     versus flaws 2nd

BugScan

BugtTraq 2nd 3rd

Building a software security program. [See Enterprise software security.]

Business context, RMF 2nd

Business-level security. [See Enterprise software security.]

Категории