Works best with JavaScript enabled!Works best in modern browsers!powered by h5ai
NameLast modifiedSize
folder-parentParent Directory
fileA Comparative Analysis of Methods of Defense against Buffer Overflow Attacks - Istvan Simon.pdf2022-02-22 06:1454 KB
fileCrackproof Your Software - Protect Your Software Against Crackers - Pavol Cerven 2002.pdf2022-02-22 06:147207 KB
fileFoundations of Security - What Every Programmer Needs to Know - Christoph Kern, Anita Kesavan, Neil Daswani 2007.pdf2022-02-22 06:142054 KB
filepeepcode-security.pdf2022-02-22 06:14502 KB
fileReflections on Trusting Trust - Ken Thompson.pdf2022-02-22 06:14225 KB
filesandboxing_cycle.png2022-02-22 06:1445 KB
fileSecure Programming Cookbook for C and Cpp - Recipes for Cryptography, Authentication, Input Validation - John Viega, Matt Messier.pdf2022-02-22 06:143603 KB
fileSecure-Programs-HOWTO.pdf2022-02-22 06:141558 KB
fileSome thoughts on security after ten years of qmail - Daniel J. Bernstein.pdf2022-02-22 06:14161 KB
fileThe Art of Software Security Assessment_ Identifying and Preventing Software Vulnerabilities - Addison-Wesley Professional. Mark Dowd, John McDonald, Justin Schuh (2006).epub2022-02-22 06:145871 KB