Back to Results
First PageMeta Content
Security / Software testing / Hacking / Vulnerability / Cross-site scripting / Common Vulnerabilities and Exposures / Attack / Application security / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security


Technical article Wiley Handbook of Science and Technology for Homeland Security
Add to Reading List

Document Date: 2008-02-13 12:27:37


Open Document

File Size: 323,85 KB

Share Result on Facebook

City

Article / /

IndustryTerm

weak technology / installed software / software artifacts / chosen algorithm / virtual hardware / cross-site / software artifact / software engineering model / code scanning software / software artifact vulnerabilities / software development processes / vulnerable algorithms / affected technology / web browser plugins / software engineering development models / code scanning tools / software lifecycle / vulnerable systems / weak password-based systems / software artifact vulnerability / web browsers / software development / software security errors / /

Movie

Homeland Security 4 / /

Position

researcher / General / /

Product

LDAP injection / SQL injection / /

ProgrammingLanguage

Pascal / /

Technology

Encryption / TCP protocol / bad algorithm / correctly chosen algorithm / operating system / underlying technology / DNS / operating systems / API / affected technology / specific technology / weak technology / network protocols / /

SocialTag