Defensive programming

Results: 19



#Item
1Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
2Grid computing / GLite / Middleware / Vulnerability / Voms / Secure coding / Defensive programming / Computing / Computer security / Cyberwarfare

Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-11-01 12:06:00
3Computer programming / Buffer overflow / Off-by-one error / Pointer / Integer overflow / Circular buffer / String / Defensive programming / C / Software bugs / Computing / Software engineering

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
4Psychological theories / Epigenetics / Human development / Human behavior / Motivation / Psychological resilience / Prenatal stress / Thrifty phenotype / Environmental enrichment / Biology / Medicine / Behavior

Neuroscience and Biobehavioral Reviews–865 www.elsevier.com/locate/neubiorev Review The programming of individual differences in defensive responses

Add to Reading List

Source URL: champagnelab.psych.columbia.edu

Language: English - Date: 2008-05-09 20:37:40
5Cyberwarfare / Hacking / Software testing / Source code / Vulnerability / Secure coding / Application security / Coding conventions / Defensive programming / Computing / Computer security / Computer programming

Secure Coding Initiative Jason A. Rafail Monday, May 14th, 2007 © 2007 Carnegie Mellon University

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 15:41:12
6Software bugs / Buffer overflow / Circular buffer / C / Stack buffer overflow / Defensive programming / Computing / Software engineering / Computer programming

Exception Handling Exception handling can help ameliorate the problem of indexing arrays outside their bounds. It allows the programmer to control what happens when an input string is too long. Exception handling is a

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:45
7National security / Electronic commerce / Secure communication / Computing / Software engineering / Computer security / Application security / Penetration test / Defensive programming / Computer network security / Security / Crime prevention

Wouldn’t it be Nice …? secure enough for Paul E. Black secure enough

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-15 07:43:19
8Computing / Exception handling / New / Defensive programming / Exception handling syntax / Exception chaining / Software engineering / Control flow / Computer programming

SHIELDS UP! DEFENSIVE CODING IN C# Presented by Jeremy Clark www.jeremybytes.com

Add to Reading List

Source URL: www.jeremybytes.com

Language: English - Date: 2014-04-07 16:43:45
9Software bugs / Buffer overflow / Memory safety / Stack buffer overflow / Circular buffer / Splint / C string handling / Defensive programming / C standard library / Computing / Computer programming / Software engineering

Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2001-12-31 15:21:50
UPDATE