[SYMBOL]
[A]
[B]
[C]
[D]
[E]
[F]
[G]
[H]
[I]
[J]
[K]
[L]
[M]
[N]
[O]
[P]
[Q]
[R]
[S]
[T]
[U]
[V]
[W]
[Y]
[Z]
back doors attack backups, tape bad code psychological factors real-world factors technical factors bad practices during design during implementation during operations Bar-Gad, Izhar Barcalow, Jeffrey bastion host Beattie, Steve Bellovin, Steven M. Bentley, Jon Bishop, Matt bit rot bit-twiddling attack black-box testing book resources bounds checking Brooks, Frederick P. 2nd buffer overflow attack buffer overflows bugs cost of fixing estimates Butler, Shawn A. |