Date: 2005-09-25 18:44:49Computer network security Hacking Code audit Information technology audit Vulnerability Cross-site scripting SQL injection Web application security Code injection Uncontrolled format string Application security Computer security | | Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science DepartmentAdd to Reading ListSource URL: suif.stanford.eduDownload Document from Source Website File Size: 527,71 KBShare Document on Facebook
|