Main Menu
Home Articles Directory Submit Popular Site Top Rated Site - Programming - Database - Management - Software Testing and Quality Assurance - Approaches, Process, Methods New Links RSS/Atom
Sponsors



  Main  |  Submit New Article  

  Popular articles (top10)  |  Top rated articles (top10)  |  Category List  

Main  arrow  Programming  arrow  Security  (90)


Sort by:   Title ( Title (A to Z) Title (Z to A)) Date ( Date (Old Links Listed First) Date (New Links Listed First)) Rating ( Rating (Lowest Score to Highest Score) Rating (Highest Score to Lowest Score)) Popularity ( Popularity (Least to Most Hits) Popularity (Most to Least Hits))
Articles currently sorted by: Date (New Links Listed First)


Visit   The SOA Myth Busters Present: "SOA & Information Security"    Last Update 2016/5/30 6:33
Category  Approaches, Process, Methods  arrow  Software Architecture  :  Programming  arrow  Platforms  arrow  Services / Microservices  :  Programming  arrow  Security
Description
So, do you like working with and around SOA? That's great because so do we, and we've been doing it every single day since a long time ago. As SOA professionals, we've seen the concept grow, change and mature, bringing up new dimensions and technology with it. We're Arturo Viveros and Rolando Carrasco, the SOA Myth Busters from Mexico, and through this series of articles, we will try and put to the test a number of questions, myths and urban legends regarding both Service Orientation & SOA Architectures in search of finding out which myths are true and which are not.

Hits: 10  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Enterprise Software Security: Design Activities    Last Update 2015/3/19 8:03
Category  Programming  arrow  Security
Description
A perfectly coded but poorly designed application can end up having egregious security defects. The authors of Enterprise Software Security: A Confluence of Disciplines take a look at "design" in a general sense and include some aspects that you might or might not consider to be design work per se. These include requirements and specifications.

Hits: 8  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Client-Side Data Encryption with the AWS SDK for Java and Amazon S3    Last Update 2015/3/10 6:44
Category  Programming  arrow  Java  :  Programming  arrow  Security  :  Programming  arrow  Platforms  arrow  Cloud
Description
The AWS SDK for Java provides an easy to use, client-side encryption mechanism to help you securely store your application's data in Amazon S3. Since the encryption/decryption is all done client side, your private encryption keys never leave your application.

Hits: 49  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   SQL Injection: How it Works and How to Thwart it Popular articles    Last Update 2015/2/16 12:05
Category  Database  arrow  SQL Language  :  Programming  arrow  Security
Description
This article explains SQL injection attacks, how to defend against them, and how to keep your Chief Information Security Officer from appearing on the nightly news.

Hits: 1389  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Security Architecture Approaches    Last Update 2014/4/8 6:55
Category  Approaches, Process, Methods  arrow  Software Architecture  :  Programming  arrow  Security
Description
The choice of architecture methodology can increase or diminish efficiency. It is necessary to understand which methodology provides the most effective approach.

Hits: 41  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Secure Your Embedded Systems Now!    Last Update 2013/12/11 5:43
Category  Programming  arrow  Platforms  arrow  Embedded & Real-time  :  Programming  arrow  Security
Description
This article explores the somewhat hidden world of embedded computing and its emerging security issues. As computing power spreads into our everyday appliances and electronic devices, many principles of computer security are slow to be added to the feature list. What can we do?

Hits: 30  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   JAAS-based security authentication on JSPs    Last Update 2013/12/4 13:48
Category  Programming  arrow  Java  :  Programming  arrow  Security
Description
This article explores the JAAS-based security authentication on Java Server Pages (JSPs).

Hits: 134  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Dot NET Assemblies and Strong Name Signature    Last Update 2013/4/30 15:19
Category  Programming  arrow  .NET  :  Programming  arrow  Security
Description
This article discusses .NET assemblies and strong name signature. In addition to providing some benefits like versioning and giving name uniqueness to an assembly, strong name provides a strong integrity check, and here is the point of this article! By strongly naming an assembly, you are supposed to ensure that your binary has not been tampered with since it was compiled or built.

Hits: 20  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Managing Security Requirements in Agile Projects    Last Update 2013/2/25 18:01
Category  Approaches, Process, Methods  arrow  Agile  :  Programming  arrow  Security
Description
Managing security requirements from early phases of software development is critical. This article discusses how to map security requirements to user stories in Agile projects.

Hits: 31  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)

Visit   Java Secure Random Number Generation    Last Update 2013/1/21 14:37
Category  Programming  arrow  Java  :  Programming  arrow  Security
Description
This article discusses the usage of SecureRandom in Java to create random numbers. If random numbers might look easy when you hear about them for the first time, it is not so easy to create them. In the case of Java, the trade-off is between performance and security, so choose wisely.

Hits: 78  
Modify  |  Report Broken Link  |  Tell a Friend  |  Comments (0)



(1) 2 3 4 5 6 7 8 9 » 
Practical
Methods & Tools
RSS 2.0
Twitter
Contact
THEME_VALIDXHTML    THEME_VALIDCSS

Copyright (c) 2007-2013 Martinig & Associates | Methods & Tools Software Development Magazine | Privacy Policy
Software Development Tools | Software Development Articles | Software Development Directory | Software Development Videos
Software Development Jobs | Software Development News | Software Development Books
Software Development Blogs | Software Development Conferences