×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [bad programming]
Code Generation: The Safety Scissors of Metaprogramming
334 views
Gameplay: Consists of the challenges and actions that a game offers. Challenges for the player to overcome and actions that let her overcome them
244 views
The Cross Site Scripting Guide
1.363 views
Security Dangers of Social Networking
1.864 views
Software Gone Wrong. SECURITY INNOVATION ©2003 2 Computer Security Security is an enabling technology of the Internet.Security is an enabling technology
221 views
MediaMediaMediaMedia Literacy Web Images Videos Maps News Shopping Gmail more ▼iGoogle | Search settings | Sign in Advanced Search Language Tools Critical
216 views
7. Goals of Software Design Design faces many challenges to produce a good product, e.g. shifting requirements. But what do we mean by good ? We need some
214 views
Security Realities in the Age of E-Commerce Bruce Schneier Counterpane Internet Security, Inc. 3031 Tisch Way, San Jose, CA 95128 Phone: (408) 556-2401;
222 views
Secured IP telephony. 2Secured IP Telephony. © 2008 Aastra Communications, Ltd. Agenda »ToIP : risks ? »Security analysis »Bests practices »Security in
224 views
C HAPTER 9 GAMEPLAY Nate Cutler. M AKING GAMES FUN Designer’s primary goal is to entertain, through gameplay Without gameplay entertainment can be fun
226 views
Security Realities in the Age of E-Commerce Bruce Schneier
43 views
A Survey of Host Based Intrusion Detection Systems (HIDS) Emre Can Sezer Dept. of Comp. Science North Carolina State University
218 views
Next >