Secure programming environments, Programming Languages

Assignment Help:

1. A readme.txt file with:

a. Instructions on how to compile and run your client and server code on the command line. (Also provide shell scripts if the commands are complicated)

b. A list of the user accounts you've created for testing, including their usernames, passwords and user types. You should create at least

1 user for each user type.

2. A report.pdf file with:

a. Program design that includes a class diagram and a behaviour diagram (preferably using UML).

b. Short description of how the program works.
c. A list of the security issues you considered, and the security measures you've taken to address them in your code / design.

3. Your source code, with

a. any relevant client-side files in a client/ subdirectory (eg. sample contestant submissions), and

b. any relevant server-side files in a server/ subdirectory (eg. the submissions/ folder)

4. Testing results: a copy of the input to the program and output produced by it. You can use the script command under Unix (see man -s1 script), or other screen capturing programs.


Related Discussions:- Secure programming environments

Lisp and Prolog, Is there one can help me in the language Lisp and Prolog

Is there one can help me in the language Lisp and Prolog

Motion field matlab with quiver, how to get the HORIZONTAL motion field fro...

how to get the HORIZONTAL motion field from motion vectors matrices

Difference between java and j2ee programming, Difference between java and j...

Difference between java and j2ee programming In the basic form, the phrase java is placed as a selection terminology. On the other hand, the phrase J2EE is placed as a renderin

develop a web page via href attribute, 1.  Develop a Web page via href att...

1.  Develop a Web page via href attribute of anchor tag and the attribute: vlink, alink, etc. 2.  Develop a Web page, in which when the user clicks on the link it will go to the

Create a raptor program - use class in raptor and in python, In this porti...

In this portion of the lab you will analyze a problem and create a Raptor program to solve it.  Make sure you use a class in Raptor and in Python to solve the problem.  Read the fo

Fileless document and encryption(stegnography), code for using tree view co...

code for using tree view control and fill it with database

Data normalization and schema refinement, What is Data Normalization and Sc...

What is Data Normalization and Schema Refinement? Define briefly..

Frotran 2000, Please explain about sub programming.

Please explain about sub programming.

Memory hierarchy for linux systems, Memory Hierarchy for Linux Systems ...

Memory Hierarchy for Linux Systems A cache line has one or more valid bit(s), tag entry and list of bytes in a block in one set of a cache, as shown below: If you were

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd