First Page | Document Content | |
---|---|---|
Date: 2014-08-18 19:00:37Computing Software testing Hacking Software bugs Vulnerability Penetration test Trojan horse Flaw hypothesis methodology JavaScript Cyberwarfare Computer network security Computer security | A Taxonomy CARL of Computer E. LANDWEHR,Add to Reading ListSource URL: www.landwehr.orgDownload Document from Source WebsiteFile Size: 3,55 MBShare Document on Facebook |
Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer ProgramDocID: 1gyHY - View Document | |
A Taxonomy CARL of Computer E. LANDWEHR,DocID: 19US5 - View Document | |
Naval Research Laboratory Washington, DC[removed]NRL/FR[removed]A Taxonomy of Computer ProgramDocID: hOz1 - View Document |