Anas' Views
Tuesday, 29 April 2014
SQL Injection Prevention & Detection Techniques
Database Design Best Practices
Defensive Coding Best Practices
Penetration Testing
Static Analysis of Code
Safe Development Libraries
Proxy Filters
Anomaly Based Intrusion Detection
Instruction Set Randomization
Dynamic Tainting
Model-based Checkers
No comments:
Post a Comment
Newer Post
Older Post
Home
Subscribe to:
Post Comments (Atom)
No comments:
Post a Comment