Defensive programming: Difference between revisions

Content deleted Content added
-/Talk
Note that the techniques below are ''not'' sufficient to ensure security: see the articles computer insecurity and secure computing for more information.
Line 3:
for a [[Denial of Service]] or other attack.
 
Note that the techniques below are ''not'' sufficient to ensure security: see the articles [[computer security]], [[computer insecurity]] and [[secure computing]] for more information.
 
-----------------------
 
<i>Please expand this article. These random notes should be changed to a more coherent article.</i>