𝔖 Bobbio Scriptorium
✦   LIBER   ✦

Wireless researchers learn to see through walls


Book ID
104392735
Publisher
Elsevier Science
Year
2009
Tongue
English
Weight
239 KB
Volume
2009
Category
Article
ISSN
1353-4858

No coin nor oath required. For personal study only.

✦ Synopsis


S ecure software development is still an underexplored topic for many organisations, who failed to design security in at the early stage of the development process. The issue is complicated by advanced software architectural concepts, such as object oriented design, in which multiple pieces of software inherit characteristics and methods from each other.

This article discusses a practical approach to assessing vulnerabilities within object oriented designs, taking into account object-based principles such as inheritance and polymorphism.

Go to page 13...

B rowser-based malware attacks

have become increasingly common, and the packing of legitimate websites using techniques such as SQL injection and FTP password theft has led to a proliferation of bot-infected machines. How can users protect themselves against such threats?

Network Security


πŸ“œ SIMILAR VOLUMES