Canlas et al., 2021 - Google Patents
ASP. NET Core 5 Secure Coding CookbookCanlas et al., 2021
View PDF- Document ID
- 10303249276451377195
- Author
- Canlas R
- Price E
- Publication year
External Links
Snippet
Google Googlebot - Web Crawler SEO Page 1 Google Googlebot - Web Crawler SEO Page 2
ASP.NET Core 5 Secure Coding Cookbook Practical recipes for tackling vulnerabilities in your
ASP.NET web applications Roman Canlas BIRMINGHAM—MUMBAI Google Googlebot …
Classifications
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/57—Certifying or maintaining trusted computer platforms, e.g. secure boots or power-downs, version controls, system software checks, secure updates or assessing vulnerabilities
- G06F21/577—Assessing vulnerabilities and evaluating computer system security
-
- G—PHYSICS
- G06—COMPUTING; CALCULATING; COUNTING
- G06F—ELECTRICAL DIGITAL DATA PROCESSING
- G06F21/00—Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
- G06F21/50—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems
- G06F21/52—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow
- G06F21/54—Monitoring users, programs or devices to maintain the integrity of platforms, e.g. of processors, firmware or operating systems during program execution, e.g. stack integrity ; Preventing unwanted data erasure; Buffer overflow by adding security routines or objects to programs
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Clarke-Salt | SQL injection attacks and defense | |
US8800042B2 (en) | Secure web application development and execution environment | |
Stuttard et al. | The web application hacker's handbook: Finding and exploiting security flaws | |
Almorsy et al. | Supporting automated vulnerability analysis using formalized vulnerability signatures | |
Hsu | Practical security automation and testing: tools and techniques for automated security scanning and testing in devsecops | |
Tran et al. | Security issues in android application development and plug-in for android studio to support secure programming | |
Mudryi et al. | The Hidden Dangers of Browsing AI Agents | |
Morgado et al. | Towards Web Application Security by Automated Code Correction. | |
Woodraska et al. | Security mutation testing of the FileZilla FTP server | |
Canlas et al. | ASP. NET Core 5 Secure Coding Cookbook | |
Dahse | Static detection of complex vulnerabilities in modern PHP applications | |
Huszti | Security Analysis of Android Applications | |
Nunes | Blended security analysis for web applications: Techniques and tools | |
Popa | Requirements of a better secure program coding | |
Nolan | Bulletproof Android: practical advice for building secure apps | |
Hermosillo et al. | Using aspect programming to secure web applications | |
Kilaru | Improving techniques for SQL injection defenses | |
Bouke | Software Development Security | |
Mohammadi et al. | Automated detecting and repair of cross-site scripting vulnerabilities | |
Gasiba et al. | Can Secure Software be developed in Rust? On Vulnerabilities and Secure Coding Guidelines | |
Reintjes et al. | a Benchmark Approach To Analysis the Security of Web Frameworks | |
Lapins et al. | Vulnerability Analysis of Web Applications in the MERN Stack | |
Rodriguez et al. | Secure Development Methodology for Full Stack Web Applications: Proof of the Methodology Applied to Vue. js, Spring Boot and MySQL. | |
Ananbeh | Domain-Specific LLMs-Based Refactoring Techniques for Software Vulnerabilities | |
Yan et al. | MGC: A Compiler Framework Exploiting Compositional Blindness in Aligned LLMs for Malware Generation |