KE
Ctrlk
  • dotNet Web 3.0
  • Engineering Management
    • Process Planning (SDLC)
    • Estimation
  • Requirements
    • Software Requirements Engineering
  • Design
    • OOD
    • DB Design
    • Modeling
    • Security
      • Information security concepts
      • Access Control Lists (ACLs)
      • Access Control Models
      • .NET Cryptography Model
      • ASP.NET Identity
      • OWASP Top 10
      • Cross-Site Request Forgery (XSRF)
      • Protecting against cross-site scripting attacks (XSS)
      • Protecting against buffer overrun attacks
      • Protecting against SQL-injection attacks
      • CSRF/XSRF protection
    • Algorithms
  • Construction Core
    • Programming language
    • Concurrency
    • Refactoring
    • Product deploying, software installation
    • Networking
  • Construction Web
    • Web server applications
    • Web Services
    • Microservices and Cloud
    • JavaScript, HTML, CSS
    • JavaScript Frameworks
  • Construction DB
    • SQL
    • Data Access Layer
  • Verification
    • Code Quality
    • Automated Testing (principles, patterns, and practices)
    • Automated Testing (Frameworks, Tools, Libraries)
  • Configuration Management
    • Product builds and Continuous Integration
    • Managing Versions
Powered by GitBook
On this page
  1. Design

Security

Information security conceptsAccess Control Lists (ACLs)Access Control Models.NET Cryptography ModelASP.NET IdentityOWASP Top 10Cross-Site Request Forgery (XSRF)Protecting against cross-site scripting attacks (XSS)Protecting against buffer overrun attacksProtecting against SQL-injection attacksCSRF/XSRF protection
PreviousData Flow DiagramsNextInformation security concepts

Last updated 6 years ago