Rx iT World Hacking Tutorial
Rx iT World Hacking Tutorial
CI/CD Security
CI/CD pipelines and processes facilitate efficient, repeatable software builds and ...
Rx iT World Hacking Tutorial
C-Based Toolchain Hardening
C-Based Toolchain Hardening is a treatment of project settings that will help you deliver ...
Rx iT World Hacking Tutorial
Bean validation
Bean validation (JSR303 aka Bean Validation 1.0 /JSR349 aka Bean Validation 1.1) is one ...
Rx iT World Hacking Tutorial
Authorization Testing Automation
Authorizations definition and implementation is one of the important protection measures ...
Rx iT World Hacking Tutorial
Authorization
Authorization may be defined as "the process of verifying that a requested action or ...
Rx iT World Hacking Tutorial
Authentication
Authentication is the process of verifying that an individual, entity, or website is ...
Rx iT World Hacking Tutorial
Attack Surface Analysis
This article describes a simple and pragmatic way of doing Attack Surface Analysis and ...
Rx iT World Hacking Tutorial
Abuse Case
Often when the security level of an application is mentioned in requirements, the ...
Rx iT World Hacking Tutorial
AJAX Security
This document will provide a starting point for AJAX security and will hopefully be ...
Rx iT World Hacking Tutorial
Types of API Tools
APIs are becoming an increasingly large portion of the software that powers the Internet ...
Rx iT World Hacking Tutorial
What is a Virtual Patch?
This paper presents a virtual patching framework that organizations can follow to ...
Rx iT World Hacking Tutorial
Using the Java Cryptographic Extensions
The code included in this article has not been reviewed and should not be used without ...
Rx iT World Hacking Tutorial
Types of XSS
Early on, two primary types of XSS were identified, Stored XSS and Reflected XSS. In ...
Rx iT World Hacking Tutorial
Threat Modeling Process
This document describes a structured approach to application threat modeling that enables ...
Rx iT World Hacking Tutorial
Threat Modeling
Threat modeling works to identify, communicate, and understand threats and mitigations ...
Rx iT World Hacking Tutorial
Source code analysis tools
Source code analysis tools, also known as Static Application Security Testing (SAST) ...
Rx iT World Hacking Tutorial
Slow Down Online Guessing Attacks with Device Cookies
Device cookies as additional authenticator for users devices have been discussed and used ...
Rx iT World Hacking Tutorial
Session Timeout
Session timeout represents the event occuring when a user does not perform any action on ...



