Works best with JavaScript enabled!
Works best in
modern browsers
!
powered by h5ai
Name
Last modified
Size
Parent Directory
A Comparative Analysis of Methods of Defense against Buffer Overflow Attacks - Istvan Simon.pdf
2022-02-22 06:14
54 KB
Crackproof Your Software - Protect Your Software Against Crackers - Pavol Cerven 2002.pdf
2022-02-22 06:14
7207 KB
Foundations of Security - What Every Programmer Needs to Know - Christoph Kern, Anita Kesavan, Neil Daswani 2007.pdf
2022-02-22 06:14
2054 KB
peepcode-security.pdf
2022-02-22 06:14
502 KB
Reflections on Trusting Trust - Ken Thompson.pdf
2022-02-22 06:14
225 KB
sandboxing_cycle.png
2022-02-22 06:14
45 KB
Secure Programming Cookbook for C and Cpp - Recipes for Cryptography, Authentication, Input Validation - John Viega, Matt Messier.pdf
2022-02-22 06:14
3603 KB
Secure-Programs-HOWTO.pdf
2022-02-22 06:14
1558 KB
Some thoughts on security after ten years of qmail - Daniel J. Bernstein.pdf
2022-02-22 06:14
161 KB
The Art of Software Security Assessment_ Identifying and Preventing Software Vulnerabilities - Addison-Wesley Professional. Mark Dowd, John McDonald, Justin Schuh (2006).epub
2022-02-22 06:14
5871 KB