Knowledge Resources | Dar Al-hikmah Library | Public Access
Subject(s): Computer security | Data encryption (Computer science) | Software protection Contents:Pt. 1. Security design principles -- Security goals -- Secure systems design -- Secure design principles -- Exercises for part 1 -- Pt. 2. Secure programming techniques -- Worms and other malware -- Buffer overflows -- Client-state manipulatio