Secure programming environments, Programming Languages

Assignment Help:

1. A readme.txt file with:

a. Instructions on how to compile and run your client and server code on the command line. (Also provide shell scripts if the commands are complicated)

b. A list of the user accounts you've created for testing, including their usernames, passwords and user types. You should create at least

1 user for each user type.

2. A report.pdf file with:

a. Program design that includes a class diagram and a behaviour diagram (preferably using UML).

b. Short description of how the program works.
c. A list of the security issues you considered, and the security measures you've taken to address them in your code / design.

3. Your source code, with

a. any relevant client-side files in a client/ subdirectory (eg. sample contestant submissions), and

b. any relevant server-side files in a server/ subdirectory (eg. the submissions/ folder)

4. Testing results: a copy of the input to the program and output produced by it. You can use the script command under Unix (see man -s1 script), or other screen capturing programs.


Related Discussions:- Secure programming environments

Language processors, explain steps of program execution in language process...

explain steps of program execution in language processors

Windows communication foundation, Windows Communication Foundation The Micr...

Windows Communication Foundation The Microsoft windows Interaction or communication foundation (or WCF), formerly known as "Indigo", is an application selection program (API) in th

Wsdl service architecture in uml, Design the proposed implementation using ...

Design the proposed implementation using the contract first approach and object oriented approaches.  At a minimum, you must provide an overview of the services in the service arch

What is hiding a method? explain, Question 1 Explain the three traits of O...

Question 1 Explain the three traits of Object Oriented Programming Question 2 Write a note on (a) Assignment Operators                             b) Bitwise Operators.

Design and implement a character analyser, Your task is to write an applica...

Your task is to write an application to analyse texts in a file.  Your application will employ  several kinds of text-analyser objects (which you also have to implement)  as descri

Shell script to find a particular pattern from the file, Normal 0 ...

Normal 0 false false false EN-US X-NONE X-NONE MicrosoftInternetExplorer4

What are program visible and invisible resisters, What are program visible ...

What are program visible and invisible resisters? A4) Program visible is those registers that can be programmed by the users, or which are customizable, whereas Program invisible

Depth estimation from a single view camera, i doing a project about depth e...

i doing a project about depth estimation, i have done some research, and i used the block matching algorithm to get the motion vectors from the image sequences, i now have the prob

No Linux Audible, Why no Audible support for Linux? Maybe they should use a...

Why no Audible support for Linux? Maybe they should use a browser interface?

Define call by value - computer programming, Define Call by value - Compute...

Define Call by value - Computer Programming? Functions are raise by writing their name and an appropriate list of arguments within parenthesis. Usually these arguments are in t

Write Your Message!

Captcha
Free Assignment Quote

Assured A++ Grade

Get guaranteed satisfaction & time on delivery in every assignment order you paid with us! We ensure premium quality solution document along with free turntin report!

All rights reserved! Copyrights ©2019-2020 ExpertsMind IT Educational Pvt Ltd