Software Security: Building Security In

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Danahy, Jack

Dangerous Functions phylum

Data Leaking Between Users phylum

Deadlock phylum

Decompilers

Defects. [See also Bugs; Flaws; Taxonomy of coding errors.]

    architectural risk analysis [See Architectural risk analysis]

    causes. [See Causes of problems.]

     definition

     design-level vulnerabilities

     error detection

     failure recovery

     fifty/fifty

     midrange vulnerabilities

     range of

Defining the risk mitigation strategy 2nd

Department of Homeland Security portal

Dependencies. [See Weakness analysis.]

Deployment and operations, software developers and information security practitioners

Design-level vulnerabilities 2nd [See also Flaws]

Destructive activities, touchpoints

Developer Desktop

DHS portal. [See Department of Homeland Security portal.]

Diagnostic knowledge

Diebold insecurity

Dilger, Mike 2nd

Directory Restriction phylum

Disassemblers

Double Free phylum

Duplicate Validation Forms phylum

Категории