首页 | 本学科首页   官方微博 | 高级检索  
文章检索
  按 检索   检索词:      
出版年份:   被引次数:   他引次数: 提示:输入*表示无穷大
  收费全文   7篇
  免费   0篇
一般工业技术   1篇
自动化技术   6篇
  2009年   1篇
  2006年   1篇
  2000年   4篇
  1995年   1篇
排序方式: 共有7条查询结果,搜索用时 15 毫秒
1
1.
The source code scanning tool Jslint helps programmers automatically utilize existing security knowledge. The tool identifies insecure coding practices by scanning for common problems, to prevent bugs that are familiar to the security community  相似文献   
2.
Alexander  R.T. Bieman  J.M. Viega  J. 《Computer》2000,33(4):30-38
Despite Java attributes (memory management, strong type checking, and built-in support for exception handling) that promote reliable, bug-free software, some features contribute to, rather than alleviate, programmer stress because they create obscure places for bugs to hide. The authors have identified seven features that can lead to particularly resistant bugs. Their goal is not to indict Java-they are strong supporters, and their own organizations have adopted Java as their primary programming language. Rather, they want programmers to better understand Java's weaknesses and know how to cope with them. Being aware of these design weaknesses (Java's false sense of protection, constructor confusion, finalizer methods, subclass substitution, container limitations, final parameters, and initialization diffusion), programmers can make sure that Java's design flaws don't make implementation more difficult than it has to be  相似文献   
3.
Viega  J. Voas  J. 《IT Professional》2000,2(5):40-47
Supporters frequently tout Windows NT as being the most secure commercially available operating system. Others tend to believe this opinion after hearing of Unix's many infamous security vulnerabilities. In reality, the two operating systems have far more in common from a security point of view than people expect. This, then, makes it difficult to honestly assert that NT is more secure than Unix. By providing a brief introduction to the security architectures of Unix and Windows, we hope to convince readers that both operating systems have substantial merit from a security point of view and that neither operating system offers clearly superior security  相似文献   
4.
Properly designing and securing your Web services application is important, and it's not just a matter of using security standards. Developers must understand both the limitations and drawbacks to security standards in order to fully secure their Web services. In this article, we outline the role of security standards in Web services development. We then look at each of these three pitfalls in detail. Finally, we provide some suggestions on how to address standards-based security in a Web application.  相似文献   
5.
6.
Viega  J. Vuas  J. 《Software, IEEE》2000,17(6):19-21
Aspect-oriented programming (AOP) is a novel topic in the software engineering and languages communities. AOP appears to have the potential to significantly improve the reliability of programs, particularly by modularizing error-handling policies and allowing for easier maintenance and better reuse. In this article, we introduce AspectJ, the first AOP language, and demonstrate how you can use it to construct more reliable software  相似文献   
7.
Cloud Computing and the Common Man   总被引:2,自引:0,他引:2  
Viega  John 《Computer》2009,42(8):106-108
The cloud offers several advantages, but until some of its risks are better understood many major players might hold back.  相似文献   
1
设为首页 | 免责声明 | 关于勤云 | 加入收藏

Copyright©北京勤云科技发展有限公司  京ICP备09084417号