Exploiting Software : How To Break Code
Saved in:
Main Author: | |
---|---|
Format: | TEXT |
Published: |
Addison-Wesley
|
Subjects: | |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
id |
amikomlib-2442 |
---|---|
record_format |
oai_dc |
spelling |
amikomlib-24422016-08-08 00:00:00Resource Centre UNIVERSITAS AMIKOM YOGYAKARTAExploiting Software : How To Break CodeGary McGrawPraise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large aAddison-WesleyTEXT |
institution |
Universitas Amikom Yogyakarta |
collection |
Perpustakaan Yogyakarta |
topic |
Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large a |
spellingShingle |
Praise for Exploiting Software Exploiting Software highlights the most critical part of the software quality problem. As it turns out, software quality problems are a major contributing factor to computer security problems. Increasingly, companies large a Gary McGraw Exploiting Software : How To Break Code |
description |
|
format |
TEXT |
author |
Gary McGraw |
author_facet |
Gary McGraw |
author_sort |
Gary McGraw |
title |
Exploiting Software : How To Break Code |
title_short |
Exploiting Software : How To Break Code |
title_full |
Exploiting Software : How To Break Code |
title_fullStr |
Exploiting Software : How To Break Code |
title_full_unstemmed |
Exploiting Software : How To Break Code |
title_sort |
exploiting software : how to break code |
publisher |
Addison-Wesley |
publishDate |
|
_version_ |
1742475574641688576 |