Back to Results
First PageMeta Content
Software / Reverse engineering / Information security / Software cracking / Managed Extensions for C++ / Application security / .NET Framework / Vulnerability / Source code / Computing / Computer programming / Computer security


ISSA Preeminent Trusted Global Information Security Community ISSA Journal | November 2009
Add to Reading List

Document Date: 2014-07-03 11:01:29


Open Document

File Size: 905,27 KB

Share Result on Facebook

Company

W3C / Gartner Inc. / Qifense LLC / Ethics Group / IDEAlliance / Open Compliance / West / Microsoft / PreEmptive Solutions / Applied Concepts / Full Spectrum Software / /

/

Facility

Through Visual Studio / /

IndustryTerm

cross-site / large software development platform / Internet application technologies / code injection technology / bank employees surveying customer experience / recognized riskmitigation technologies / distributed computing models / content management / recognized risk-mitigation technologies / technology characteristics / free developer tools / automotive devices / application lifecycle management solutions / software developers / online banking applications / risk management / acquired products / anti-reverse engineering tools / application hardening technology characteristics / software development / software piracy / patch management / managed code systems / client-side software / Customer relationship management / executive product / copyright protection systems / home-based customer contact solutions / Internet applications / Medical device equipment / open source applications / managed software / bank / software / software controls / software debugging / manufacturing / obfuscation tool / Technology evaluation criteria / potential technologies / /

Movie

Ahead of time / /

Organization

Information Systems Security Association / /

Person

Joseph Feiman / Sebastian Holst Modifying / Neil MacDonald / Sebastian Holst / /

Position

editor / author / reverse engineer / Analyst / /

Product

SQL injection / /

ProgrammingLanguage

Java / SQL / /

Technology

SOA / virtual machine / code injection technology / CRM / machine translation / 3 Technology / Technology evaluation criteria Each technology / risk mitigation Technology / mobile phones / broadly recognized risk-mitigation technologies / Internet application technologies / mobile devices / encryption / String encryption / content management / Java / broadly recognized riskmitigation technologies / digital signature / Just-In-Time compiler / /

URL

http /

SocialTag