Defensive programming

Results: 19



#Item
1Combating the Top 4 Sources of Software Vulnerabilities

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
2Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch  Elisa Heymann

Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann

Add to Reading List

Source URL: research.cs.wisc.edu

Language: English - Date: 2012-11-01 12:06:00
3Taming Bugs  The Art and Science of writing secure Code Paul Böhm

Taming Bugs The Art and Science of writing secure Code Paul Böhm

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
4Neuroscience and Biobehavioral Reviews–865 www.elsevier.com/locate/neubiorev Review  The programming of individual differences in defensive responses

Neuroscience and Biobehavioral Reviews–865 www.elsevier.com/locate/neubiorev Review The programming of individual differences in defensive responses

Add to Reading List

Source URL: champagnelab.psych.columbia.edu

Language: English - Date: 2008-05-09 20:37:40
5Secure Coding Initiative  Jason A. Rafail Monday, May 14th, 2007  © 2007 Carnegie Mellon University

Secure Coding Initiative Jason A. Rafail Monday, May 14th, 2007 © 2007 Carnegie Mellon University

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 15:41:12
6Software bugs / Buffer overflow / Circular buffer / C / Stack buffer overflow / Defensive programming / Computing / Software engineering / Computer programming

Exception Handling Exception handling can help ameliorate the problem of indexing arrays outside their bounds. It allows the programmer to control what happens when an input string is too long. Exception handling is a

Add to Reading List

Source URL: nsfsecurity.pr.erau.edu

Language: English - Date: 2002-07-06 21:20:45
7Wouldn’t it be Nice …?  secure enough for Paul E. Black secure enough

Wouldn’t it be Nice …? secure enough for Paul E. Black secure enough

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-15 07:43:19
8SHIELDS UP!  DEFENSIVE CODING IN C# Presented by Jeremy Clark www.jeremybytes.com

SHIELDS UP! DEFENSIVE CODING IN C# Presented by Jeremy Clark www.jeremybytes.com

Add to Reading List

Source URL: www.jeremybytes.com

Language: English - Date: 2014-04-07 16:43:45
9Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Statically Detecting Likely Buffer Overflow Vulnerabilities David Larochelle [removed] University of Virginia, Department of Computer Science David Evans [removed]

Add to Reading List

Source URL: lclint.cs.virginia.edu

Language: English - Date: 2001-12-31 15:21:50