Quantitative Security Characteristics of Perl Programs
The program quality is used to be characterized with error number per 1000 code lines. This parameter is calculated by a statistical regressive analysis of error numbers for successive code versions, with a subsequent extrapolation for the future. This procedure is very tedious even for large compan...
| Published in: | Современные информационные технологии и IT-образование |
|---|---|
| Main Authors: | Anna A. Kulikovskaya, Elizaveta A. Dorenskaya, Yuri A. Semenov |
| Format: | Article |
| Language: | Russian |
| Published: |
The Fund for Promotion of Internet media, IT education, human development «League Internet Media»
2022-12-01
|
| Subjects: | |
| Online Access: | http://sitito.cs.msu.ru/index.php/SITITO/article/view/926 |
Similar Items
Technique Development of Secure Programming Training
by: V. V. Gurov, et al.
Published: (2012-03-01)
by: V. V. Gurov, et al.
Published: (2012-03-01)
Exploring How to Apply Secure Software Design Principles
by: Shouki A. Ebad
Published: (2022-01-01)
by: Shouki A. Ebad
Published: (2022-01-01)
An analysis of influence of safe programming techniques on applications efficiency and security
by: Tomasz Kobiałka
Published: (2018-03-01)
by: Tomasz Kobiałka
Published: (2018-03-01)
Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques
by: T. R. Khabibullin, et al.
Published: (2012-09-01)
by: T. R. Khabibullin, et al.
Published: (2012-09-01)
A Common Security and Defence Policy: Limits to Differentiated Integration in PESCO?
by: Anneke Houdé, et al.
Published: (2023-02-01)
by: Anneke Houdé, et al.
Published: (2023-02-01)
Principles of Information Security Theory Forming
by: A. A. Malyuk
Published: (2011-06-01)
by: A. A. Malyuk
Published: (2011-06-01)
Analysis of Systems Security Engineering Design Principles for the Development of Secure and Resilient Systems
by: Paul M. Beach, et al.
Published: (2019-01-01)
by: Paul M. Beach, et al.
Published: (2019-01-01)
The Effect of Subsidy Reform Program on Food Security in Iran
by: Seyyed Safdar Hosseini, et al.
Published: (2016-06-01)
by: Seyyed Safdar Hosseini, et al.
Published: (2016-06-01)
UNDERSTANDING AUDIT METHODS TO ASSIST PLANNING ON PROGRAM EVALUATION: SHARING GAO’S EXPERIENCE ON NATIONAL HEALTH SECURITY PROGRAM
by: I Gede Sudi Adnyana
Published: (2017-06-01)
by: I Gede Sudi Adnyana
Published: (2017-06-01)
Reducing Honeypot Log Storage Capacity Consumption – Cron Job with Perl-Script Approach
by: Iman Hazwam Bin Abd Halim, et al.
Published: (2019-11-01)
by: Iman Hazwam Bin Abd Halim, et al.
Published: (2019-11-01)
VECT: an automatic visual Perl programming tool for nonprogrammers
by: Hui-Hsien Chou
Published: (2005-04-01)
by: Hui-Hsien Chou
Published: (2005-04-01)
Implementation of the European program in the field of security as a tool to ensure safety
by: Miloš SVRČEK, et al.
Published: (2024-06-01)
by: Miloš SVRČEK, et al.
Published: (2024-06-01)
Strategic Pattern for Building National Security in Accordance with the Laws of the Economic, Political, and Cultural Development Program
by: Mohsen Smaeili, et al.
Published: (2014-02-01)
by: Mohsen Smaeili, et al.
Published: (2014-02-01)
Methodological approach to development and implementation of the Small Nuclear Power Plants program
by: Semenov Victor, et al.
Published: (2021-01-01)
by: Semenov Victor, et al.
Published: (2021-01-01)
PERLE - ERL Test Facility at Orsay
by: S.A. Bogacz
Published: (2022-07-01)
by: S.A. Bogacz
Published: (2022-07-01)
Strengthening Social Resistance in Iran; An Analysis of Development Programs with a Socialized Security Approach
by: HASAN Shahbaz
Published: (2024-08-01)
by: HASAN Shahbaz
Published: (2024-08-01)
TRUST AND CUSTOMER SATISFACTION BASED SERVQUAL IN SOCIAL SECURITY AWARENESS MARKETING PROGRAM
by: Raudah Rakhmah Yumi, et al.
Published: (2024-02-01)
by: Raudah Rakhmah Yumi, et al.
Published: (2024-02-01)
The Urgency of Job Loss Security Program for the Protection of Human Rights
by: Asri Lasatu, et al.
Published: (2024-09-01)
by: Asri Lasatu, et al.
Published: (2024-09-01)
Relevant Problems of Implementing State Policy in the Field of Ensuring Information Security of Ukraine
by: Ye. V. Kobko, et al.
Published: (2021-07-01)
by: Ye. V. Kobko, et al.
Published: (2021-07-01)
Analysis of Sharia Conformity Aspects in Stock Investment Based on Securities Crowdfunding
by: Sofyan Mei Utama, et al.
Published: (2022-09-01)
by: Sofyan Mei Utama, et al.
Published: (2022-09-01)
Programmed Grooming after 30 Years of Study: A Review of Evidence and Future Prospects
by: Michael S. Mooring
Published: (2024-04-01)
by: Michael S. Mooring
Published: (2024-04-01)
Legal issues of the effectiveness of the security and defense sector's security forces in view of the need to comply with the constitutional principles of activity
by: Natalia Komissarova, et al.
Published: (2023-06-01)
by: Natalia Komissarova, et al.
Published: (2023-06-01)
Ujuzi (Practical Pearl/Perle Pratique)
by: P.K. Forson, et al.
Published: (2014-03-01)
by: P.K. Forson, et al.
Published: (2014-03-01)
Program-technical complex of diagnosis of a region's energy security
by: Anatoliy Leonidovich Myzin, et al.
Published: (2012-06-01)
by: Anatoliy Leonidovich Myzin, et al.
Published: (2012-06-01)
The Development of the Modern System of Law of International Security
by: Inna Anatolyevna Orlova
Published: (2018-04-01)
by: Inna Anatolyevna Orlova
Published: (2018-04-01)
Food and nutritional security: knowledge and actions ofnurses of the Family Health Program for patients with chronic illnesses
by: Maria Augusta Vasconcelos Palácio, et al.
Published: (2009-09-01)
by: Maria Augusta Vasconcelos Palácio, et al.
Published: (2009-09-01)
Development of Family Based Food Security Policy Program Evaluation Model in The Sustainable Food Yard (P2l) Program in Tuban District
by: Pipin Diah Larasati, et al.
Published: (2023-03-01)
by: Pipin Diah Larasati, et al.
Published: (2023-03-01)
Reinstatement of the Extension Principle in Approaching Mathematical Programming with Fuzzy Numbers
by: Bogdana Stanojević, et al.
Published: (2021-06-01)
by: Bogdana Stanojević, et al.
Published: (2021-06-01)
Disarmament and Military Cooperation as Vectors of National Security Ensuring
by: Ekaterina Sergeevna Andreeva
Published: (2018-04-01)
by: Ekaterina Sergeevna Andreeva
Published: (2018-04-01)
Security assessment of the selected mobile platform
by: Aleksandra Iwaniuk
Published: (2018-12-01)
by: Aleksandra Iwaniuk
Published: (2018-12-01)
BIO::Phylo-phyloinformatic analysis using perl
by: Hartmann Klaas, et al.
Published: (2011-02-01)
by: Hartmann Klaas, et al.
Published: (2011-02-01)
The Contrast between Individual and National Security in Crimes against Security
by: Jafar Yazdian Jafari
Published: (2016-03-01)
by: Jafar Yazdian Jafari
Published: (2016-03-01)
On Combining Static, Dynamic and Interactive Analysis Security Testing Tools to Improve OWASP Top Ten Security Vulnerability Detection in Web Applications
by: Francesc Mateo Tudela, et al.
Published: (2020-12-01)
by: Francesc Mateo Tudela, et al.
Published: (2020-12-01)
Finance and Innovation Solutions to Implement Investment Programs in Electric-Power Complex of the Russian Federation
by: N. V. Gryzunova, et al.
Published: (2021-12-01)
by: N. V. Gryzunova, et al.
Published: (2021-12-01)
Household Food Security Analysis Case Study on Sustainable Food House Area Program (KRPL) in Bandungrejosari Village, Sukun District, Malang
by: Tartila Fitri, et al.
Published: (2022-08-01)
by: Tartila Fitri, et al.
Published: (2022-08-01)
The application of the dynamic programming method in investment optimization
by: Petković Nina, et al.
Published: (2016-01-01)
by: Petković Nina, et al.
Published: (2016-01-01)
Integration and coherence in food governance—a comprehensive analysis of food security public programs in Chile
by: Martín del Valle M, et al.
Published: (2024-11-01)
by: Martín del Valle M, et al.
Published: (2024-11-01)
PRINCIPLE OF ENSURING FOOD SECURITY OF THE COUNTRY IN THE AGRICULTURAL LAW OF THE RUSSIAN FEDERATION
by: A. Mokhov
Published: (2021-09-01)
by: A. Mokhov
Published: (2021-09-01)
Global Security: Ukrainian HOPSIS Program and Space Mission to Destroy Asteroids
by: Volodymyr Prisyazhnyy, et al.
Published: (2023-05-01)
by: Volodymyr Prisyazhnyy, et al.
Published: (2023-05-01)
Eric Perl’s Theophanism: An Option for Agnostics?
by: Travis Dumsday
Published: (2020-05-01)
by: Travis Dumsday
Published: (2020-05-01)
Similar Items
-
Technique Development of Secure Programming Training
by: V. V. Gurov, et al.
Published: (2012-03-01) -
Exploring How to Apply Secure Software Design Principles
by: Shouki A. Ebad
Published: (2022-01-01) -
An analysis of influence of safe programming techniques on applications efficiency and security
by: Tomasz Kobiałka
Published: (2018-03-01) -
Vulnerabilities of Software for Mobile Phones and Secure Programming Techniques
by: T. R. Khabibullin, et al.
Published: (2012-09-01) -
A Common Security and Defence Policy: Limits to Differentiated Integration in PESCO?
by: Anneke Houdé, et al.
Published: (2023-02-01)
