<--- Back to Details
First PageDocument Content
Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security
Date: 2014-08-18 19:00:37
Computing
Software testing
Hacking
Software bugs
Vulnerability
Penetration test
Trojan horse
Flaw hypothesis methodology
JavaScript
Cyberwarfare
Computer network security
Computer security

A Taxonomy CARL of Computer E. LANDWEHR,

Add to Reading List

Source URL: www.landwehr.org

Download Document from Source Website

File Size: 3,55 MB

Share Document on Facebook

Similar Documents

Software testing / Security / Software bugs / Hacking / Vulnerability / Flaw hypothesis methodology / Penetration test / Cyberwarfare / Computer security / Computer network security

Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

DocID: 1gyHY - View Document

Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security

A Taxonomy CARL of Computer E. LANDWEHR,

DocID: 19US5 - View Document

Software testing / Security / Software bugs / Hacking / Vulnerability / Flaw hypothesis methodology / Penetration test / Cyberwarfare / Computer security / Computer network security

Naval Research Laboratory Washington, DC[removed]NRL/FR[removed]A Taxonomy of Computer Program

DocID: hOz1 - View Document