Software Security: Building Security In

Index

[SYMBOL] [A] [B] [C] [D] [E] [F] [G] [H] [I] [J] [K] [L] [M] [N] [O] [P] [Q] [R] [S] [T] [U] [V] [W] [X] [Y] [Z]

Kernel vulnerabilities 2nd

KillerAppCo. [See RMF, example.]

Kingdoms. [See Taxonomy of coding errors, kingdoms.]

Knowledge

     attack patterns 2nd

     Department of Homeland Security portal

     description

     diagnostic knowledge

     experience

     expertise

     exploits 2nd

     guidelines 2nd

     historical knowledge

     historical risks 2nd

     hurdles to overcome

     in the touchpoint process

     knowledge catalogs 2nd 3rd

     prescriptive knowledge

     principles 2nd 3rd

     rules 2nd 3rd

     vulnerabilities 2nd

Knowledge base, Fortify

Knowledge catalogs 2nd 3rd

Knowledge requirements, architectural risk analysis

Kocher, Paul

Категории