image
INDEX
A
abuse cases
adversaries
XP
acceptance
modifications
risk
access control
for integrity
models
in Safe Harbor principles
access control lists (ACLs)
access control matrix model
accounting
auditing
design for
ACLs (access control lists)
acquisition of software components
actions in requirements
activities in requirements
actors in use cases
Address Space Layout Randomization (ASLR)
advanced persistent threat (APT) attacks
adversaries
groups
inside and outside
types
advice for end users from suppliers
agile methods
ALE (annualized loss expectancy)
algorithms
cryptographic
digital certificates
allocation, memory
alpha testing
alteration of ...

Get CSSLP Certification All-in-One Exam Guide now with O’Reilly online learning.

O’Reilly members experience live online training, plus books, videos, and digital content from 200+ publishers.