×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [securing software]
Jeremy Brown & David Seidman - Microsoft Vulnerability Research: How to be a finder as a vendor [Rooted CON 2014]
394 views
Non-Control-Data Attacks and Securing software by enforcing data- flow integrity Zhiqiang Lin Mar 28, 2007 CS590 paper presentation
218 views
Vigilante: End-to-End Containment of Internet Worms
31 views
The Emergence of Software Security Standards
71 views
Securing software by enforcing data-flow integrity
55 views