Secure coding

Results: 94



#Item
21Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science

Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2009-01-20 23:46:12
22SecurityMetrics  Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
23FevereiroMelhores Práticas de Codificação Segura OWASP Guia de Referência Rápida OWASP Secure Coding Practices – Quick Reference Guide

FevereiroMelhores Práticas de Codificação Segura OWASP Guia de Referência Rápida OWASP Secure Coding Practices – Quick Reference Guide

Add to Reading List

Source URL: www.owasp.org

- Date: 2012-02-04 15:40:09
    24NovemberOWASP Secure Coding Practices Quick Reference Guide  Copyright and License

    NovemberOWASP Secure Coding Practices Quick Reference Guide Copyright and License

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:32
      25FevereiroMelhores Práticas de Programação Segura OWASP Guia de Referência Rápida OWASP Secure Coding Practices – Quick Reference Guide

      FevereiroMelhores Práticas de Programação Segura OWASP Guia de Referência Rápida OWASP Secure Coding Practices – Quick Reference Guide

      Add to Reading List

      Source URL: www.owasp.org

      Language: Portuguese - Date: 2012-02-04 15:39:04
        26Roland Graf  Die konsumistische Kultur und ihre Zeichen: Distanzwirkung und Durchlässigkeit der Werbesprache “In opposition to a strategy of coding, which strives to render messages redundant in order to secure interp

        Roland Graf Die konsumistische Kultur und ihre Zeichen: Distanzwirkung und Durchlässigkeit der Werbesprache “In opposition to a strategy of coding, which strives to render messages redundant in order to secure interp

        Add to Reading List

        Source URL: www2.mediamanual.at

        Language: German - Date: 2009-06-05 07:28:24
          27Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch  Elisa Heymann

          Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann

          Add to Reading List

          Source URL: research.cs.wisc.edu

          Language: English - Date: 2012-11-01 12:06:00
          28www.nyphp.com / www.nyphp.org  PHundamental Security Ecosystem Review, Coding Secure with PHP, and Best Practices

          www.nyphp.com / www.nyphp.org PHundamental Security Ecosystem Review, Coding Secure with PHP, and Best Practices

          Add to Reading List

          Source URL: nyphp.org

          Language: English - Date: 2015-05-26 04:21:45
          29Secure Coding Practices for .NET ApplicationsWPFinal.doc

          Secure Coding Practices for .NET ApplicationsWPFinal.doc

          Add to Reading List

          Source URL: www.cgisecurity.com

          Language: English - Date: 2008-11-02 16:09:54
          30The newsletter of The Acoustical Society of America Volume 15, Number 1 Winter 2005

          The newsletter of The Acoustical Society of America Volume 15, Number 1 Winter 2005

          Add to Reading List

          Source URL: asa.aip.org

          Language: English