Secure coding

Results: 94



#Item
1Software / Computing / Computer programming / Integrated development environments / JetBrains / SonarQube / IntelliJ IDEA / FindBugs / Eclipse / Java / NetBeans / Cppcheck

Poster: IDE Plugins for Secure Coding Aniqua Z. Baset University of Utah Abstract—Many vulnerabilities in products and systems could

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2017-05-13 03:19:52
2

Teaching Coding in Journalism Schools: Considerations for a Secure Technological Infrastructure Meredith Broussard New York University 20 Cooper Square #702 New York, NY 10003

Add to Reading List

Source URL: cj2015.brown.columbia.edu

Language: English - Date: 2015-10-01 12:16:30
    3

    WHITE PAPER Secure Coding for Android Applications 1

    Add to Reading List

    Source URL: www.mcafee.com

    Language: English - Date: 2018-05-31 16:53:45
      4

      Secure Coding Practices in Java: Challenges and Vulnerabilities

      Add to Reading List

      Source URL: people.cs.vt.edu

      Language: English - Date: 2018-02-20 21:21:37
        5

        Training Proactive Web Defense A three-day training course in web application security and secure coding practices, helping to ensure that your software is resilient to attacks from even the most advanced threats

        Add to Reading List

        Source URL: www.mwrinfosecurity.com

        Language: English - Date: 2016-07-28 07:11:18
          6

          Secure Coding for Real-Time Embedded Systems: Cert Run-Time Profile for Ada Mable Benjamin Georgia Tech Research Institute, Atlanta, GA Abstract— Safety and security in software coding is

          Add to Reading List

          Source URL: cybersec-prod.s3.amazonaws.com

          - Date: 2016-10-05 17:20:38
            7Engineering / Computing / Security engineering / Robert C. Seacord / Secure coding / Computer programming / Vulnerability / Security Patterns / Software engineering / Cyberwarfare / Software development / Grady Booch

            Microsoft Word - review18.doc

            Add to Reading List

            Source URL: www.jot.fm

            Language: English - Date: 2007-08-10 10:58:07
            8Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

            Combating the Top 4 Sources of Software Vulnerabilities

            Add to Reading List

            Source URL: www.veracode.com

            Language: English - Date: 2016-07-20 15:52:45
            9User interface techniques / Mobile security / Internet privacy / Form

            [ATTACHMENT] Secure Coding Checker Trial Version Terms of Use This Secure Coding Checker Trial Version Terms of Use (hereinafter referred to as the "Terms") sets forth the terms of use for the trial version of the servi

            Add to Reading List

            Source URL: mini.scc.sonydna.com

            Language: English - Date: 2016-07-22 04:01:36
            10Hello / Trouble Man: Heavy Is the Head

            Secure Coding Patterns @andhallberg TrueSec Trust

            Add to Reading List

            Source URL: gotocon.com

            Language: English - Date: 2016-06-21 10:28:17
            UPDATE