A Security Guide for Kotlin Developers
A Security Guide for otlin Developers I N D E X Overview..................................................................1 Kotlin’s Security Profile............................................2 Most Common Security Attacks...............................3 Top Kotlin Security Risk...........................................5 OWASP Mobile TOP 10 Mobile Risks..........................10 Protect developers and other key decision makers in software security and software supply chain vulnerabilities with information regarding the top security risks they can expect to face — from inherent weaknesses0 码力 | 13 页 | 1.80 MB | 1 年前3Security Beyond Memory Safety
C and C++: A Security Perspective Security Beyond Memory Safety Using Modern C++ to Avoid Vulnerabilities by DesignMax Hoffmann Security Beyond Memory Safety CppCon 2024 2 Security Beyond Memory Safety Hoffmann Security Beyond Memory Safety CppCon 2024 3 FIFTY SHADES OF SHOOTING YOURSELF IN THE FOOT WITH A RAILGUNMax Hoffmann Security Beyond Memory Safety CppCon 2024 4Max Hoffmann Security Beyond yearsMax Hoffmann Security Beyond Memory Safety CppCon 2024 6Max Hoffmann Security Beyond Memory Safety CppCon 2024 7Max Hoffmann Security Beyond Memory Safety CppCon 2024 8Max Hoffmann Security Beyond Memory0 码力 | 79 页 | 4.15 MB | 5 月前3Embracing an Adversarial Mindset for Cpp Security
Embracing an Adversarial Mindset for C++ Security Amanda Rousseau 9/18/2024 This presentation is for informational purposes only. MICROSOFT MAKES NO WARRANTIES, EXPRESS OR IMPLIED, IN THIS SUMMARY1 Strategies for Secure C++ DevelopmentWHOAMI 0x401006 Microsoft 0x40100C Offensive 0x40100F Research & Security 0x401018 Engineering 0x40101A (MORSE) CURRENT 0x401000 MALWARE UNICORN AMANDA ROUSSEAU 0x402001 perspectiveFactors Influencing Trends Increased Security Awareness and Practices Adoption of Modern Technologies •secure coding, regular patching, comprehensive security testing •Improved Discovery Methods -0 码力 | 92 页 | 3.67 MB | 5 月前3Spring Security Shiro Plugin - Reference Documentation
Spring Security Shiro Plugin - Reference Documentation Burt Beckwith Version 3.1.2.BUILD-SNAPSHOT Table of Contents 1. Introduction to the Spring Security Shiro Plugin . . . . . . . . . . . . . . Chapter 1. Introduction to the Spring Security Shiro Plugin The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring Security and Shiro. It currently only supports supports Shiro ACLs, since Spring Security ACLs are very powerful but can be very cumbersome to use, and the Shiro approach is straightforward and simple. The majority of the authentication and authorization0 码力 | 8 页 | 122.93 KB | 10 月前3Shiro support for the Spring Security plugin - Reference Documentation
1 Shiro support for the Spring Security plugin Table of contents 2 Shiro support for the Spring Security plugin - Reference Documentation Authors: Burt Beckwith Version: 0.1 Table of Contents 1 Introduction The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring Security and . It currently only supports Shiro ACLs, since Spring Security ACLs are very Shiro authentication and authorization work is still done by Spring Security. This plugin listens for Spring Security authentication events and uses the Spring Security Authentication instance to build and register a Shiro0 码力 | 6 页 | 17.49 KB | 10 月前3Shiro support for the Spring Security plugin - Reference Documentation
the Spring Security plugin Shiro support for the Spring Security plugin - Reference Documentation Authors: Burt Beckwith Version: 1.0.0 Table of Contents 1 Introduction to the Spring Security Shiro Plugin Spring Security Shiro Plugin The Spring Security Shiro plugin adds some support for using a hybrid approach combining Spring and . It currently only supports Shiro ACLs, since Spring Security ACLs are are very Security Shiro powerful but can be very cumbersome to use, and the Shiro approach is straightforward and simple. The majority of the authentication and authorization work is still done by Spring0 码力 | 5 页 | 16.72 KB | 10 月前3Spring Boot 2.0.0.M3 Reference Guide
JSP limitations 28. Security OAuth2 Authorization Server Resource Server Token Type in User Info Customizing the User Info RestTemplate Client Single Sign On Actuator Security 29. Working with SQL endpoints Hypermedia for actuator MVC endpoints CORS support Adding custom endpoints Health information Security with HealthIndicators Auto-configured HealthIndicators Writing custom HealthIndicators Application Disabling extended Cloud Foundry actuator support Cloud Foundry self signed certificates Custom security configuration 58. What to read next VI. Deploying Spring Boot applications 59. Deploying to the0 码力 | 590 页 | 513.07 KB | 1 年前3Spring Boot 1.5.6.RELEASE Reference Guide
JSP limitations 28. Security OAuth2 Authorization Server Resource Server Token Type in User Info Customizing the User Info RestTemplate Client Single Sign On Actuator Security 29. Working with SQL endpoints Hypermedia for actuator MVC endpoints CORS support Adding custom endpoints Health information Security with HealthIndicators Auto-configured HealthIndicators Writing custom HealthIndicators Application Disabling extended Cloud Foundry actuator support Cloud Foundry self signed certificates Custom security configuration 57. What to read next VI. Deploying Spring Boot applications 58. Deploying to the0 码力 | 601 页 | 531.65 KB | 1 年前3Spring Boot 1.5.x-SNAPSHOT Reference Documentation
....................................................................................... 92 28. Security ............................................................................................... ............................................................................ 97 28.4. Actuator Security .............................................................................................. .................................................................................... 170 47.6. Security with HealthIndicators .........................................................................0 码力 | 386 页 | 2.00 MB | 1 年前3Spring Boot 1.5.22.RELEASE Reference Documentation
....................................................................................... 92 28. Security ............................................................................................... ............................................................................ 97 28.4. Actuator Security .............................................................................................. .................................................................................... 170 47.6. Security with HealthIndicators .........................................................................0 码力 | 386 页 | 2.00 MB | 1 年前3
共 1000 条
- 1
- 2
- 3
- 4
- 5
- 6
- 100