...@gmail.commailto:mvanaswe...@gmail.com
Date: Monday, September 16, 2013 3:15 PM
To: Secure Code Mailing List
SC-L@securecoding.orgmailto:SC-L@securecoding.org
Subject: [SC-L] SearchSecurity: Architecture Risk Analysis
Garry,
We have a step were we figure out how the various architecture intersect and
synthesize
Garry,
We have a step were we figure out how the various architecture intersect
and synthesize together. After all you inherit more than you define and
deliver.
Marinus
-
hi sc-l,
Software security in general spends a lot of time talking about bugs---too
much time, I believe. We all know
hi sc-l,
Software security in general spends a lot of time talking about bugs---too much
time, I believe. We all know that software defects come in two major
subclasses: bugs (in the implementation) and flaws (in the design). So, how do
you find and FIX flaws?
That's what this month's