It looks like you're offline.
Open Library logo
additional options menu
Last edited by RenameBot
September 7, 2008 | History

John Viega

12 works Add another?

Sorting by Sorted by: Most Editions | First Published | Most Recent | Top Rated | Reading Log | Random

Showing all works by author. Would you like to see only ebooks?

  • Cover of: Beautiful Security
    First published in 2008 5 editions in 1 language — 2 previewable Cover of edition beautifulsecurit00oram_747

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Building secure software: how to avoid security problems the right way

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Network Security with OpenSSL
    First published in 2002 4 editions in 1 language — 1 previewable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: The myths of security: what the computer security industry doesn't want you to know

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Secure programming cookbook for C and C++
    First published in 2003 3 editions in 1 language — 1 previewable

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: 19 deadly sins of software security: programming flaws and how to fix them

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Valuepack : Building Secure Software : How to Avoid Security Problems the Right Way/Computer Networking : A Top-down Approach: International Edition

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Java Enterprise Architecture

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Building Secure Software: How to Avoid Security Problems the Right Way (paperback) (Addison-wesley Professional Computing Series)

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Software Security Library Boxed Set, First Edition

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Building Secure Softwarehow to Avoid Sec

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today
  • Cover of: Gou jian an quan de ruan jian: bi mian chan sheng ruan jian an quan wen ti de zheng que fang fa = Building secure software : how to avoid security problems the right way

    My Reading Lists:

    Create a new list

    Check-In

    ×Close
    Add an optional check-in date. Check-in dates are used to track yearly reading goals.
    Today

History

Download catalog record: RDF / JSON
September 7, 2008 Edited by RenameBot fix author name
April 1, 2008 Created by an anonymous user initial import