Secure programming environments, Programming Languages

Assignment Help:

1. A readme.txt file with:

a. Instructions on how to compile and run your client and server code on the command line. (Also provide shell scripts if the commands are complicated)

b. A list of the user accounts you've created for testing, including their usernames, passwords and user types. You should create at least

1 user for each user type.

2. A report.pdf file with:

a. Program design that includes a class diagram and a behaviour diagram (preferably using UML).

b. Short description of how the program works.
c. A list of the security issues you considered, and the security measures you've taken to address them in your code / design.

3. Your source code, with

a. any relevant client-side files in a client/ subdirectory (eg. sample contestant submissions), and

b. any relevant server-side files in a server/ subdirectory (eg. the submissions/ folder)

4. Testing results: a copy of the input to the program and output produced by it. You can use the script command under Unix (see man -s1 script), or other screen capturing programs.


Related Discussions:- Secure programming environments

Write a program that prints gross and net pay and taxes , Assume that a vid...

Assume that a video store employee works 50 hours. She gets paid $4.50 for the first 40 hours; she gets time-and-a half pay (1.5 times the regular pay rate) for the first five hour

Implement a two-dimensional table in prolog, Implement a two-dimensional ta...

Implement a two-dimensional table in Prolog. Your program will contain: 1.  An insert_entry predicate that takes a table, row, column and an entry and inserts the entry at the g

Program for deleting nodes from the binary search tree, Problem: This...

Problem: This assignment is about deleting nodes from the binary search tree. You need to use given sequence to construct a binary search tree and then delete some nodes from

Cobol, Need help with a cobol program.

Need help with a cobol program.

How would you install a multiple layered security product, Problem: (i)...

Problem: (i) All Security authentication mechanism that run on the TRU64 Unix Operating system run under the Security Integration Architecture ( SIA ) layer. Explain with diag

Create program that displays levels of the fractal structure, In this Proje...

In this Project your task is to create a program that displays various levels of the fractal structure of the so called square shaped Sierpinski-carpet. The display of level 4 is s

Read Multiple Text Files, How to read datasets in multiple text files in an...

How to read datasets in multiple text files in an non interactive program?

Data normalization and schema refinement, What is Data Normalization and Sc...

What is Data Normalization and Schema Refinement? Define briefly..

Define the procedures cons, Show that we can represent pairs of nonnegative...

Show that we can represent pairs of nonnegative integers using only numbers and arithmetic operations if we represent the pair a and b as the integer that is the product 2 a 3 b .

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd