|
No information avaiable
http://en.wikipedia.org/wiki/Role-based_access_control
popularity:
security
rbac
authentication
role
access
acl
wikipedia
programming
authorization
software
|
|
No information avaiable
similarity:
popularity:
rbac
security
design
roles
acl
identity
provisioning
authorization
article
software
|
|
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
hacking
internet
application
webdev
software
|
|
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
webdev
reference
software
application
internet
|
|
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|
|
The WiKID Strong Authentication System is a patented dual-source, software-based ... We want you to download the WiKID Strong Authentication server and tokens, get ...
similarity:
popularity:
security
authentication
opensource
identity
pki
linux
wikid
software
tools
vpn
|
|
The JSecurity project has permanently moved to the Apache ... News and Announcements. 1 comment. 12 3 4 next "last " Copyright © 2005-2008 JSecurity.org ...
similarity:
popularity:
security
java
framework
opensource
authentication
jsecurity
authorization
library
programming
web
|
|
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org. International in scope and free for public use, CWE™ provides a unified, measurable set of ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
|
|
rootkit.com is a site and a forum discussing about rootkits. online since 1999
similarity:
popularity:
security
rootkit
hacking
tools
exploits
windows
hack
programming
software
rootkits
|
|
Click here for sample chapters, plenty of reviews, and other useful information. ... NEW Interesting vulnerabilities: exploitable DOM fuzzing crashes in multiple ...
similarity:
popularity:
security
hacking
programming
tools
network
software
people
blog
linux
geek
|
|
Common Weakness Enumeration (CWE) is a list of software weaknesses. ... cwe@mitre.org ... Contact cwe@mitre.org for more information. ...
similarity:
popularity:
security
programming
software
reference
development
vulnerabilities
testing
vulnerability
research
dictionary
|