| Document Date: 2008-02-13 12:27:37 Open Document File Size: 323,85 KBShare Result on Facebook
City Article / / IndustryTerm weak technology / installed software / software artifacts / chosen algorithm / virtual hardware / cross-site / software artifact / software engineering model / code scanning software / software artifact vulnerabilities / software development processes / vulnerable algorithms / affected technology / web browser plugins / software engineering development models / code scanning tools / software lifecycle / vulnerable systems / weak password-based systems / software artifact vulnerability / web browsers / software development / software security errors / / Movie Homeland Security 4 / / Position researcher / General / / Product LDAP injection / SQL injection / / ProgrammingLanguage Pascal / / Technology Encryption / TCP protocol / bad algorithm / correctly chosen algorithm / operating system / underlying technology / DNS / operating systems / API / affected technology / specific technology / weak technology / network protocols / /
SocialTag |