×
Log in
Upload File
Most Popular
Art & Photos
Automotive
Business
Career
Design
Education
Hi-Tech
+ Browse for More
The top documents tagged [securing software]
Technology
Jeremy Brown & David Seidman - Microsoft Vulnerability Research: How to be a finder as a vendor [Rooted CON 2014]
394 views
Documents
Non-Control-Data Attacks and Securing software by enforcing data- flow integrity Zhiqiang Lin Mar 28, 2007 CS590 paper presentation
218 views
Documents
Vigilante: End-to-End Containment of Internet Worms
31 views
Documents
The Emergence of Software Security Standards
71 views
Documents
Securing software by enforcing data-flow integrity
55 views