Secure Coding mailing list archives
A New Open Source Approach to Weakness
From: ken at krvw.com (Kenneth Van Wyk)
Date: Wed, 9 Aug 2006 09:20:05 -0400
FYI, here's an article about Fortify's pernicious kingdom taxonomy of common coding defects that I thought would be of interest here: http://www.internetnews.com/dev-news/article.php/3623751 Cheers, Ken ----- Kenneth R. Van Wyk KRvW Associates, LLC http://www.KRvW.com -------------- next part -------------- An HTML attachment was scrubbed... URL: http://krvw.com/pipermail/sc-l/attachments/20060809/09d4739a/attachment.html
Current thread:
- A New Open Source Approach to Weakness Kenneth Van Wyk (Aug 09)
- A New Open Source Approach to Weakness Gergely Buday (Aug 09)
- A New Open Source Approach to Weakness Jeff Williams (Aug 09)
- <Possible follow-ups>
- A New Open Source Approach to Weakness Gary McGraw (Aug 09)
- A New Open Source Approach to Weakness mcgegick at ncsu.edu (Aug 10)
- A New Open Source Approach to Weakness Jeff Williams (Aug 10)
- A New Open Source Approach to Weakness Gergely Buday (Aug 09)