Secure coding

Results: 94



#Item
61Security / Robert C. Seacord / Coding conventions / Computer security / ISO/IEC JTC1 / Cascading Style Sheets / Comment / Secure coding / Computing / Computer programming / Source code

Legal Notice This page last changed on Sep 10, 2007 by rcs. CERT C Programming Language Secure Coding Standard Document No. N1255

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2007-09-10 13:43:10
62Computing / Software testing / Security / Application security / Penetration test / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

Jumpstart a Web Application Secure Coding Program: A Five Step Process SANS STI Application Security Written Assignment Author:  Jim  Beechey,  [removed]   Advisor:  Johannes  Ulrich  

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:59:40
63OWASP / Computer network security / Software testing / Application security / Vulnerability / Password / Database security / Access control / CCWAPSS / Security / Computer security / Cyberwarfare

OWASP Secure Coding Practices Quick Reference Guide Justin Clarke [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-30 09:26:31
64Electronic commerce / Secure communication / Crime prevention / National security / Cyberwarfare / Computer security / Security and safety features new to Windows Vista / Windows Server / Computer network security / Security / Computing

Securing J2EE Applications – Coding Patterns for Secure Connections to Services Jeff Williams Aspect Security CEO [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:22
65Television / Videotelephony / Digital television / Video compression / Video signal / High Efficiency Video Coding / Data compression / Digital cinema / High-definition video / Video / Electronic engineering / High-definition television

Special Issue on Solutions for Society - Creating a Safer and More Secure Society Advanced technologies for a safer and more secure society Compression Technologies Supporting Next Generation Broadcasting Services - Ult

Add to Reading List

Source URL: www.nec.com

Language: English - Date: 2015-01-20 23:46:40
66Computer network security / Software testing / Global Information Assurance Certification / Application security / Web application security / Vulnerability / Fortify Software / Software engineering / OWASP / Computer security / Computing / Cyberwarfare

SANS Announces First Secure Coding Certification Exams and Certification for Programmers

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:53
67Computer network security / Software testing / Global Information Assurance Certification / Application security / Web application security / Vulnerability / Fortify Software / Software engineering / OWASP / Computer security / Computing / Cyberwarfare

SANS Announces First Secure Coding Certification Exams and Certification for Programmers

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
68Computer network security / Software testing / Web applications / Global Information Assurance Certification / Hacking / Web application security / Penetration test / Application security / Secure coding / Computing / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:53
69Computer network security / Software testing / Buffer overflow / Uncontrolled format string / Vulnerability / Cisco IOS / Cross-site scripting / Secure coding / JavaScript / Cyberwarfare / Computing / Computer security

Secure Coding Guide Contents Introduction to Secure Coding Guide 7 At a Glance 7

Add to Reading List

Source URL: developer.apple.com

Language: English - Date: 2014-11-21 15:12:39
70Software testing / Hacking / Robert C. Seacord / Computer network security / Vulnerability / Secure coding / Buffer overflow / Application security / Uncontrolled format string / Cyberwarfare / Computer security / Security

Overview Security Injection Modules

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-09-18 13:11:17
UPDATE