John Viega

Results: 8



#Item
1Building an Effective Application Security Practice on a Shoestring Budget John Viega  David Coffey

Building an Effective Application Security Practice on a Shoestring Budget John Viega David Coffey

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
2Building an Effective Application Security Practice on a Shoestring Budget Authors: David Coffey,  John Viega,  Abstract:

Building an Effective Application Security Practice on a Shoestring Budget Authors: David Coffey, John Viega, Abstract:

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
3r7jk.ps

r7jk.ps

Add to Reading List

Source URL: www.swsec.com

Language: English - Date: 2010-09-21 12:05:16
4Borza/Viega  Secure Device Identity Tutorial Secure Device Identity Tutorial Mike Borza

Borza/Viega Secure Device Identity Tutorial Secure Device Identity Tutorial Mike Borza

Add to Reading List

Source URL: ieee802.org

Language: English - Date: 2005-07-18 23:22:07
5GCM Update David McGrew and John Viega [removed], [removed] May 31, [removed]

GCM Update David McGrew and John Viega [removed], [removed] May 31, [removed]

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-12-05 13:52:56
6Borza/Viega  Secure Device Identity Tutorial Secure Device Identity Tutorial Mike Borza

Borza/Viega Secure Device Identity Tutorial Secure Device Identity Tutorial Mike Borza

Add to Reading List

Source URL: www.ieee802.org

Language: English - Date: 2005-07-18 23:22:07
7Automated Delegation is a Viable Alternative to Multiple Inheritance in Class Based Languages John Viega

Automated Delegation is a Viable Alternative to Multiple Inheritance in Class Based Languages John Viega

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2000-02-16 10:22:44
8

PDF Document

Add to Reading List

Source URL: myriadicity.net

Language: English