A Security Guide for Kotlin Developers
A Security Guide for otlin Developers I N D E X Overview..................................................................1 Kotlin’s Security Profile............................................2 Most Common Security Attacks...............................3 Top Kotlin Security Risk...........................................5 OWASP Mobile TOP 10 Mobile Risks..........................10 Protect developers and other key decision makers in software security and software supply chain vulnerabilities with information regarding the top security risks they can expect to face — from inherent weaknesses0 码力 | 13 页 | 1.80 MB | 1 年前3Security Beyond Memory Safety
C and C++: A Security Perspective Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Hoffmann Security Beyond Memory Safety CppCon 2024 3 FIFTY SHADES OF SHOOTING YOURSELF IN THE FOOT WITH A RAILGUNMax Hoffmann Security Beyond Memory Safety CppCon 2024 4Max Hoffmann Security Beyond yearsMax Hoffmann Security Beyond Memory Safety CppCon 2024 6Max Hoffmann Security Beyond Memory Safety CppCon 2024 7Max Hoffmann Security Beyond Memory Safety CppCon 2024 8Max Hoffmann Security Beyond Memory0 码力 | 79 页 | 4.15 MB | 5 月前3Creating a Sender/Receiver HTTP Server
com © 2024 Bloomberg Finance L.P. All rights reserved. • Create a basic HTTP server. • Allow a single-threaded server handling multiple clients. • Use the sender/receiver asynchronous framework.0 码力 | 8 页 | 2.19 MB | 5 月前3Embracing an Adversarial Mindset for Cpp Security
Embracing an Adversarial Mindset for C++ Security Amanda Rousseau 9/18/2024 This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY1 Strategies for Secure C++ DevelopmentWHOAMI 0x401006 Microsoft 0x40100C Offensive 0x40100F Research & Security 0x401018 Engineering 0x40101A (MORSE) CURRENT 0x401000 MALWARE UNICORN AMANDA ROUSSEAU 0x402001 •Advanced adversaries How: •Deserialization •Client-Server interfaces Denial of Service Who: •Hacktivists •Script Kiddies •Game hackers How: •Client-Server interfaces Medium Effort Med-High Effort High0 码力 | 92 页 | 3.67 MB | 5 月前3Spring Security Shiro Plugin - Reference Documentation
Spring Security Shiro Plugin - Reference Documentation Burt Beckwith Version 3.1.2.BUILD-SNAPSHOT Table of Contents 1. Introduction to the Spring Security Shiro Plugin . . . . . . . . . . . . . . Chapter 1. Introduction to the Spring Security Shiro Plugin The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring Security and Shiro. It currently only supports supports Shiro ACLs, since Spring Security ACLs are very powerful but can be very cumbersome to use, and the Shiro approach is straightforward and simple. The majority of the authentication and authorization0 码力 | 8 页 | 122.93 KB | 10 月前3Building API server-side architecture for Beginners
Inc. � Building API server-side architecture for Beginners GopherCon ���� ����.��.�� - @hgsgtk © ����-���� BASE, Inc. � Talk abstract • A practical approach to build server-side architecture Approach to build architecture � Summary � Talk structure © ����-���� BASE, Inc. � Why I need server-side architecture �.Keep a design easy to change • -> Separate external input/output and business ignored © ����-���� BASE, Inc. �� Go beginners have a lot of questions� How to implement API server by net/http package How to write an unit test How to use interface type - Go basic questions0 码力 | 38 页 | 690.29 KB | 1 年前3Shiro support for the Spring Security plugin - Reference Documentation
1 Shiro support for the Spring Security plugin Table of contents 2 Shiro support for the Spring Security plugin - Reference Documentation Authors: Burt Beckwith Version: 0.1 Table of Contents 1 Introduction The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring Security and . It currently only supports Shiro ACLs, since Spring Security ACLs are very Shiro authentication and authorization work is still done by Spring Security. This plugin listens for Spring Security authentication events and uses the Spring Security Authentication instance to build and register a Shiro0 码力 | 6 页 | 17.49 KB | 10 月前3Shiro support for the Spring Security plugin - Reference Documentation
the Spring Security plugin Shiro support for the Spring Security plugin - Reference Documentation Authors: Burt Beckwith Version: 1.0.0 Table of Contents 1 Introduction to the Spring Security Shiro Plugin Spring Security Shiro Plugin The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring and . It currently only supports Shiro ACLs, since Spring Security ACLs are are very Security Shiro powerful but can be very cumbersome to use, and the Shiro approach is straightforward and simple. The majority of the authentication and authorization work is still done by Spring0 码力 | 5 页 | 16.72 KB | 10 月前3Deploy WAR, EAR files inthe Java EE Server
Tomcat Sun NetBean, Eclipse Eclipse, Oracle JDevelpoer ︎ Deploy WAR, EAR files in the Java EE Server. ︎ According to environment, modify and deploy configuration files, then manage Java EE system0 码力 | 1 页 | 51.98 KB | 1 年前3Java 应用与开发 - JSP (Java Server Page)
大纲 JSP 概述 JSP 指令 JSP 动作 JSP 脚本 JSP 内置对象 本节习题 Java 应用与开发 JSP (Java Server Page) 王晓东 wangxiaodong@ouc.edu.cn 中国海洋大学 December 3, 2018 大纲 JSP 概述 JSP 指令 JSP 动作 JSP 脚本 JSP 内置对象 本节习题 学习目标 1. 理解 JSP 和 JSP 动作 JSP 脚本 JSP 内置对象 本节习题 大纲 JSP 概述 JSP 指令 JSP 动作 JSP 脚本 JSP 内置对象 本节习题 JSP 基本概念 ▶ JSP(Java Server Page),即 Java 服务器页面。 ▶ JSP 是 Servlet 的扩展。 ▶ JSP 将使用 Java 类编写动态 Web 组件的方式转变为使 用文本编写��用标记型语法和过程性语法�合�,降低了0 码力 | 47 页 | 740.36 KB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100