Lucene search
Basic search
Lucene search
Search by product
Subscribe
K
Start 30-day trial
Database
Vendors
Products
Years
CVSS
Scanner
Agent Scanning
API Scanning
Manual Audit
Perimeter Scanner
Scanning
Projects
Email
Webhook
Plugins
Resources
Documents
Blog
Glossary
FAQ
Pricing
Contacts
About Us
Partners
Branding Guideline
SIGN IN
Dennis Fisher
THREATPOST:41127956188A13C38F3155E8A155949C
History
Apr 13, 2010 - 2:41 p.m.
Vulners
/
Threatpost
/
The Lazy Programmer's Guide to Secure Computing
The Lazy Programmer's Guide to Secure Computing
2010-04-13
14:41:19
Dennis Fisher
threatpost.com
10
JSON
In this
Google TechTalk, HP’s Marc Stiegler describes a different approach to
security software.
JSON