Secure Coding GuideContents Introduction to Secure Coding Guide 7 At a Glance 7 Hackers, Crackers, and Attackers 7 No Platform Is Immune 8
| Title: | Secure Coding GuideContents Introduction to Secure Coding Guide 7 At a Glance 7 Hackers, Crackers, and Attackers 7 No Platform Is Immune 8 |
|---|---|
| Authors: | How Use; This Document |
| Contributors: | The Pennsylvania State University CiteSeerX Archives |
| Source: | https://developer.apple.com/library/mac/documentation/Security/Conceptual/SecureCodingGuide/SecureCodingGuide.pdf. |
| Collection: | CiteSeerX |
| Document Type: | text |
| File Description: | application/pdf |
| Language: | English |
| Relation: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.9067 |
| Availability: | http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.360.9067 |
| Rights: | Metadata may be used without restrictions as long as the oai identifier remains attached to it. |
| Accession Number: | edsbas.F72DA790 |
| Database: | BASE |