Back to Results
First PageMeta Content
Software testing / Systems engineering / Hacking / Software quality / Software bugs / Attack patterns / Vulnerability / Buffer overflow / Application security / Security / Computer security / Cyberwarfare


JOURNAL OF OBJECT TECHNOLOGY Online at www.jot.fm. Published by ETH Zurich, Chair of Software Engineering ©JOT, 2003 Vol. 2, No. 5, September-October[removed]Secure Software
Add to Reading List

Document Date: 2007-01-11 19:41:02


Open Document

File Size: 257,76 KB

Share Result on Facebook

Company

Oak Ridge National Laboratory / Luminary Software LLC / Testing Object-Oriented Software / Computer Associates / Microsoft / /

/

Facility

George Mason University / Clemson University / /

IndustryTerm

software engineering / component-base software / software security work deals / software development processes / software engineering consulting / well written software / software development techniques / software engineering approach / software security / extensible systems / software buffer / written software / software specification / software product / software product lines / secure software / /

Organization

George Mason University / Clemson University / Software Development Lifecycle Task Force / IEEE Computer Society / Association for Computing Machinery / /

Person

Scott Charney / Gunnar Overgaard / John D. McGregor / Ivar Jacobson / Paco Hope / Patrik Jonsson / Gary McGraw / Earl F. Ecklund / Ron Moritz / Michael J. Freiling / Magnus Christerson / Lois M.L. Delcambre / Annie I. Anton / /

Position

Author / associate professor of computer science / actor / attack actor / Chair / associate professor / /

Product

Non-executable Files Argument Injection / /

ProvinceOrState

Massachusetts / /

Technology

JOURNAL OF OBJECT TECHNOLOGY / Object-Oriented Programming / 5 JOURNAL OF OBJECT TECHNOLOGY / OBJECT TECHNOLOGY / 4 JOURNAL OF OBJECT TECHNOLOGY / 2 JOURNAL OF OBJECT TECHNOLOGY / data encryption / operating system / /

URL

www.jot.fm / /

SocialTag