@gmail.com>>
Date: Monday, September 16, 2013 3:15 PM
To: Secure Code Mailing List
mailto:SC-L@securecoding.org>>
Subject: [SC-L] SearchSecurity: Architecture Risk Analysis
Garry,
We have a step were we figure out how the various architecture intersect and
synthesize together. Afte
Garry,
We have a step were we figure out how the various architecture intersect
and synthesize together. After all you inherit more than you define and
deliver.
Marinus
-
hi sc-l,
Software security in general spends a lot of time talking about bugs---too
much time, I believe. We all know
hi sc-l,
Software security in general spends a lot of time talking about bugs---too much
time, I believe. We all know that software defects come in two major
subclasses: bugs (in the implementation) and flaws (in the design). So, how do
you find and FIX flaws?
That's what this month's Search