Secure coding

Results: 94



#Item
71Computing / Software testing / Security / Application security / Penetration test / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

Jumpstart a Web Application Secure Coding Program: A Five Step Process SANS STI Application Security Written Assignment Author:  Jim  Beechey,  [removed]   Advisor:  Johannes  Ulrich  

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:59:40
72Electronics / Bloom filter / Hashing / Network topology / Link-state routing protocol / IP traceback / Network coding / Routing / Topology / Computing / Network architecture / Routing algorithms

Evaluation of Path Recording Techniques in Secure MANET Danai Chasaki and Tilman Wolf Department of Electrical and Computer Engineering University of Massachusetts, Amherst, MA, USA Email: {dchasaki,wolf}@ecs.umass.edu

Add to Reading List

Source URL: www.ecs.umass.edu

Language: English - Date: 2013-12-04 11:29:34
73Computer file formats / Computing / Digital media / Roku / Wi-Fi / Windows Media Audio / Advanced Audio Coding / Tuner / Secure Digital / SoundBridge / Electronics / Audio codecs

SoundBridge Radio Wi-Fi Music System TM Product Overview Roku’s SoundBridge Radio is a simple, high-performance tabletop radio made for today’s connected lifestyle. SoundBridge Radio plays

Add to Reading List

Source URL: soundbridge.roku.com

Language: English - Date: 2010-07-13 05:23:38
74Computing / Application security / Attack surface / Threat model / Vulnerability / Secure coding / Fuzz testing / Computer security / Cyberwarfare / Software testing

presented by Hardening the UEFI Attack Surface Updated[removed]

Add to Reading List

Source URL: www.uefi.org

Language: English - Date: 2013-09-24 15:13:25
75Procedural programming languages / Cross-platform software / ISO/IEC JTC1 / Static program analysis / International Organization for Standardization / Buffer overflow / C / Computing / Software engineering / Programming language theory

ISO/IEC JTC 1/SC 22/WG 14/N[removed]Rationale for a C Secure Coding Analysis Technical Specification David Keaton, CERT[removed]

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2011-09-23 20:25:05
76Teleconference

Schedule - CSCG - CERT Secure Coding Standards https://www.securecoding.cert.org/confluence/disp... Schedule Added by David Keaton, last edited by David Keaton on Jan 13, 2012

Add to Reading List

Source URL: www.open-std.org

Language: English - Date: 2012-01-16 15:51:45
    77Data types / Procedural programming languages / Primitive types / C / Cross-platform software / Pointer / Enumerated type / Null / Switch statement / Computing / Software engineering / Computer programming

    WG14 Document: N1578  September 23, 2011  C Secure Coding Rules Editor’s Report 1. Status N1579 is the first submission of this document so all the content is new.  N1579 was derived from “

    Add to Reading List

    Source URL: www.open-std.org

    Language: English - Date: 2011-09-23 20:24:32
    78Finite fields / Key management / Secret sharing / Linear code / Algebraic geometry / Secure multi-party computation / RSA / Secret sharing using the Chinese remainder theorem / Verifiable secret sharing / Cryptography / Cryptographic protocols / Coding theory

    Secure Computation from Random Error Correcting Codes Hao Chen1 , Ronald Cramer2 , Shafi Goldwasser3 , Robbert de Haan4 , and Vinod Vaikuntanathan5 1

    Add to Reading List

    Source URL: people.csail.mit.edu

    Language: English - Date: 2010-02-04 10:24:27
    79Security / Hacking / Software testing / CVSS / Software quality / Vulnerability / Attack patterns / Common Vulnerabilities and Exposures / Secure coding / Computer security / Cyberwarfare / Computer network security

    Standards in reporting Software Flaws: SCAP, CVE and CWE (Part 2) Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T)

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2010-07-21 17:31:15
    80Xerox / Patch / Upgrade / Multifunction printer / Transdermal patch / Business / Software maintenance / Media technology / Technology

    Xerox Secure Coding Guidelines

    Add to Reading List

    Source URL: www.xerox.com

    Language: English - Date: 2010-03-19 14:28:58
    UPDATE