Secure coding

Results: 94



#Item
21Computing / Coding theory / Error detection and correction / IP multicast / Secure multicast / Transmission Control Protocol / Password authentication protocol / Reed–Solomon error correction / Communications protocol / Information / Data / Internet protocols

Multicast Authentication in Fully Adversarial Networks Anna Lysyanskaya Roberto Tamassia Nikos Triandopoulos Brown University Department of Computer Science

Add to Reading List

Source URL: www.cs.bu.edu

Language: English - Date: 2009-01-20 23:46:12
22Computing / Software testing / Electronic commerce / Hacking / SecurityMetrics / Penetration test / Vulnerability / Application security / Attack / Computer security / Cyberwarfare / Computer network security

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
23

FevereiroMelhores Práticas de Codificação Segura OWASP Guia de Referência Rápida OWASP Secure Coding Practices – Quick Reference Guide

Add to Reading List

Source URL: www.owasp.org

- Date: 2012-02-04 15:40:09
    24

    NovemberOWASP Secure Coding Practices Quick Reference Guide Copyright and License

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:32
      25

      FevereiroMelhores Práticas de Programação Segura OWASP Guia de Referência Rápida OWASP Secure Coding Practices – Quick Reference Guide

      Add to Reading List

      Source URL: www.owasp.org

      Language: Portuguese - Date: 2012-02-04 15:39:04
        26

        Roland Graf Die konsumistische Kultur und ihre Zeichen: Distanzwirkung und Durchlässigkeit der Werbesprache “In opposition to a strategy of coding, which strives to render messages redundant in order to secure interp

        Add to Reading List

        Source URL: www2.mediamanual.at

        Language: German - Date: 2009-06-05 07:28:24
          27Grid computing / GLite / Middleware / Vulnerability / Voms / Secure coding / Defensive programming / Computing / Computer security / Cyberwarfare

          Secure Coding Practices for Middleware Barton P. Miller James A. Kupsch Elisa Heymann

          Add to Reading List

          Source URL: research.cs.wisc.edu

          Language: English - Date: 2012-11-01 12:06:00
          28Computer programming / Cross-platform software / Initialisms / PHP / Plug-in / Software / Computing / PHP programming language

          www.nyphp.com / www.nyphp.org PHundamental Security Ecosystem Review, Coding Secure with PHP, and Best Practices

          Add to Reading List

          Source URL: nyphp.org

          Language: English - Date: 2015-05-26 04:21:45
          29Data management / ASP.NET / Microsoft Visual Studio / Form / SQL injection / Web.config / Data validation / Web application security / Cross-site scripting / Computing / Software / Web application frameworks

          Secure Coding Practices for .NET ApplicationsWPFinal.doc

          Add to Reading List

          Source URL: www.cgisecurity.com

          Language: English - Date: 2008-11-02 16:09:54
          30Cryptography / Year of birth missing / Acoustical Society of America / Signal processing / Bishnu S. Atal / Code-excited linear prediction / Vocoder / Speech coding / Secure voice / Acoustics / Sound / Waves

          The newsletter of The Acoustical Society of America Volume 15, Number 1 Winter 2005

          Add to Reading List

          Source URL: asa.aip.org

          Language: English
          UPDATE