Zobrazeno 1 - 3
of 3
pro vyhledávání: '"Miriam Birch"'
Publikováno v:
Applied Sciences, Vol 9, Iss 20, p 4229 (2019)
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm
Externí odkaz:
https://doaj.org/article/3988d3dd333747ca8fdd75289a7954d5
Publikováno v:
Applied Sciences, Vol 9, Iss 20, p 4229 (2019)
Applied Sciences
Volume 9
Issue 20
RiuNet. Repositorio Institucional de la Universitat Politécnica de Valéncia
instname
Applied Sciences
Volume 9
Issue 20
RiuNet. Repositorio Institucional de la Universitat Politécnica de Valéncia
instname
Despite the intense efforts to prevent programmers from writing code with memory errors, memory corruption vulnerabilities are still a major security threat. Consequently, control-flow integrity has received significant attention in the research comm
Externí odkaz:
https://explore.openaire.eu/search/publication?articleId=doi_dedup___::5b1beb9f845675d7e873d64923dafb82
Publikováno v:
ITiCSE
This poster describes the use of the BlueJ Java IDE in a data structures course. The BlueJ IDE is an excellent tool for teaching programming using an objects-first approach. Learners are able to create, inspect and interact with instances of classes