Back to Results
First PageMeta Content
Software testing / Software bugs / Hacking / Source code / Vulnerability / Attack patterns / Application security / Cross-site scripting / Code injection / Cyberwarfare / Computer security / Computing


Microsoft Word - tcm_taxonomy_submission.doc
Add to Reading List

Document Date: 2006-09-13 14:57:23


Open Document

File Size: 72,27 KB

Share Result on Facebook

City

Palo Alto / Socket / Washington / D.C. / Dulles / /

Company

Adobe / McDermott / Fortify Software / McGraw-Hill / Security Features Software / Keywords Software / Katrina Tsipenyuk Brian Chess Gary McGraw Fortify Software / /

/

Event

Product Issues / /

Facility

Building Security In. / Purdue University / /

IndustryTerm

web applications / software security / software security equation / Web application / user-level enterprise software / Web browser / software class / software developers / source code analysis tool / software developer / software security problem lists / static source code analysis tools / invasive software / static analysis tools / Web Application Security Vulnerabilities / software applications / Thread management / software fault / software security community / Internet Security / secure computer systems / companion web site / software security world / security software / user-level software security / software security rules / secure software / /

OperatingSystem

UNIX / GECOS / MULTICS / TOPS-10 / /

Organization

USC/Information Sciences Institute / Purdue University / National Bureau of Standards / /

Person

Array-Typed Field / Array-Typed Field Returned / /

/

Position

software developer / programmer / /

Product

Resource Injection / Command Injection / SQL Injection / Scripting Format String Problems Integer Range Errors SQL Injection / Access Control Insecure Storage Time / Session Management Errors Improper Error / Authentication / /

ProgrammingLanguage

Java / SQL / XML / ASP .NET / C++ / /

ProvinceOrState

Virginia / California / /

PublishedMedium

Psychological Review / /

Technology

XML / Unix / API / UNIX operating system / operating system / html / SSL / Operating Systems / Process Control / cryptography / DNS / automatic identification / Java / HTTP / /

URL

http /

SocialTag