KE
search
⌘Ctrlk
KE
  • dotNet Web 3.0
  • Engineering Management
    • Process Planning (SDLC)
    • Estimation
  • Requirements
    • Software Requirements Engineering
  • Design
    • OOD
    • DB Design
    • Modeling
    • Security
      • Information security concepts
      • Access Control Lists (ACLs)
      • Access Control Models
      • .NET Cryptography Model
      • ASP.NET Identity
      • OWASP Top 10
      • Cross-Site Request Forgery (XSRF)
      • Protecting against cross-site scripting attacks (XSS)
      • Protecting against buffer overrun attacks
      • Protecting against SQL-injection attacks
      • CSRF/XSRF protection
    • Algorithms
  • Construction Core
    • Programming language
    • Concurrency
    • Refactoring
    • Product deploying, software installation
    • Networking
  • Construction Web
    • Web server applications
    • Web Services
    • Microservices and Cloud
    • JavaScript, HTML, CSS
    • JavaScript Frameworks
  • Construction DB
    • SQL
    • Data Access Layer
  • Verification
    • Code Quality
    • Automated Testing (principles, patterns, and practices)
    • Automated Testing (Frameworks, Tools, Libraries)
  • Configuration Management
    • Product builds and Continuous Integration
    • Managing Versions
gitbookPowered by GitBook
block-quoteOn this pagechevron-down
  1. Design

Security

Information security conceptschevron-rightAccess Control Lists (ACLs)chevron-rightAccess Control Modelschevron-right.NET Cryptography Modelchevron-rightASP.NET Identitychevron-rightOWASP Top 10chevron-rightCross-Site Request Forgery (XSRF)chevron-rightProtecting against cross-site scripting attacks (XSS)chevron-rightProtecting against buffer overrun attackschevron-rightProtecting against SQL-injection attackschevron-rightCSRF/XSRF protectionchevron-right
PreviousData Flow Diagramschevron-leftNextInformation security conceptschevron-right

Last updated 6 years ago