[go: up one dir, main page]

Canlas et al., 2021 - Google Patents

ASP. NET Core 5 Secure Coding Cookbook

Canlas et al., 2021

View PDF
Document ID
10303249276451377195
Author
Canlas R
Price E
Publication year

External Links

Snippet

Google Googlebot - Web Crawler SEO Page 1 Google Googlebot - Web Crawler SEO Page 2 ASP.NET Core 5 Secure Coding Cookbook Practical recipes for tackling vulnerabilities in your ASP.NET web applications Roman Canlas BIRMINGHAM—MUMBAI Google Googlebot …
Continue reading at sciendo.com (PDF) (other versions)

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/57Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
    • G06F21/577Assessing vulnerabilities and evaluating computer system security
    • GPHYSICS
    • G06COMPUTING; CALCULATING; COUNTING
    • G06FELECTRICAL DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/50Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
    • G06F21/52Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
    • G06F21/54Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs

Similar Documents

Publication Publication Date Title
Clarke-Salt SQL injection attacks and defense
US8800042B2 (en) Secure web application development and execution environment
Stuttard et al. The web application hacker's handbook: Finding and exploiting security flaws
Almorsy et al. Supporting automated vulnerability analysis using formalized vulnerability signatures
Hsu Practical security automation and testing: tools and techniques for automated security scanning and testing in devsecops
Tran et al. Security issues in android application development and plug-in for android studio to support secure programming
Mudryi et al. The Hidden Dangers of Browsing AI Agents
Morgado et al. Towards Web Application Security by Automated Code Correction.
Woodraska et al. Security mutation testing of the FileZilla FTP server
Canlas et al. ASP. NET Core 5 Secure Coding Cookbook
Dahse Static detection of complex vulnerabilities in modern PHP applications
Huszti Security Analysis of Android Applications
Nunes Blended security analysis for web applications: Techniques and tools
Popa Requirements of a better secure program coding
Nolan Bulletproof Android: practical advice for building secure apps
Hermosillo et al. Using aspect programming to secure web applications
Kilaru Improving techniques for SQL injection defenses
Bouke Software Development Security
Mohammadi et al. Automated detecting and repair of cross-site scripting vulnerabilities
Gasiba et al. Can Secure Software be developed in Rust? On Vulnerabilities and Secure Coding Guidelines
Reintjes et al. a Benchmark Approach To Analysis the Security of Web Frameworks
Lapins et al. Vulnerability Analysis of Web Applications in the MERN Stack
Rodriguez et al. Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue. js, Spring Boot and MySQL.
Ananbeh Domain-Specific LLMs-Based Refactoring Techniques for Software Vulnerabilities
Yan et al. MGC: A Compiler Framework Exploiting Compositional Blindness in Aligned LLMs for Malware Generation