Protecting Insecure Programs

In most computer systems used today, programs are run that come from a variety of sources: the computer vendor, third-party vendors, open-source projects, consultants, and employees. In some cases, source code is available, but it is more often not. These programs often implement services that are...
By
Shawn Instenes
June 27, 2003

All papers are copyrighted. No re-posting of papers is permitted

470x382_Generic_Whitepaper.jpg