INDEX
A
abuse cases
adversaries
XP
acceptance
modifications
risk
access control
for integrity
models
in Safe Harbor principles
access control lists (ACLs)
access control matrix model
accounting
auditing
design for
ACLs (access control lists)
acquisition of software components
actions in requirements
activities in requirements
actors in use cases
Address Space Layout Randomization (ASLR)
advanced persistent threat (APT) attacks
adversaries
groups
inside and outside
types
advice for end users from suppliers
agile methods
ALE (annualized loss expectancy)
algorithms
cryptographic
digital certificates
allocation, memory
alpha testing
alteration of ...
Get CSSLP Certification All-in-One Exam Guide now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.