application security books

Learn about application security books, we have the largest and most updated application security books information on alibabacloud.com

Win7 System open Web page prompt application has been blocked by Java security how to do

Win7 System open Web page prompt application has been blocked by Java security how to do The specific methods are as follows: 1, complete the Java version update, and then refresh the problematic page page to exclude Java version problems caused by Java security blocking; 2, from the Start menu to open the Control Panel, we need to enter the contro

On the security of ASP.net MVC application--Practical skills

-encode it (if the data is displayed as an attribute value, it should be encoded in HTML) 3 Consider those parts of the site that allow anonymous access, and those parts require authenticated access. 4 Do not try to purify the user's HTML input yourself-otherwise you will encounter failure. 5 Use the Http-only cookie when you do not need to access cookies through client script. 6) It is highly recommended to use the ANTIXSS Library (Www.codeplex.com/AntiXSS). (2) At the same time, the

Establishing the security mechanism of application software registration with Delphi

The security of software is an eternal topic that has plagued people, and programmers often stay up late. Novell's network operating system NetWare is known for its perfect and reliable security management mechanism, which provides several effective restrictive measures and detection functions for the security of user login and the prevention of intrusion by ille

"Common Web Application Security issues"---6, Script source code disclosure

The security of the Web application is divided into a wide variety of situations, which are not intended to introduce all of them, but only some of the common ones. List of security issues for common Web application security issues:1, cross-site scripting attack

Asp. NET Application Security issues

Asp.net| Safety | security | procedure | The problem is today when debugging with Enterpriselibrary, the following error occurred: Security Exception: The current application security level cannot modify the registry values that are required for modification. The workaround is as follows: Open the Machine.config file u

Several application examples of Java regular expressions (matching URLs, matching US security code, matching date)

"; = Pattern.compile ("\\d{3}\\-?\\d{2}\\-?\\d{4}"); = Ptn.matcher (safenum); while (Mch.find ()) { System.out.println (Mch.group ()); }The result of the final output is:999-99-9999456003348456-90909045677-07643. This small example is used to match the date in English String strdate = "This is a date June 26,1951"; = Pattern.compile ("([a-za-z]+) \\s[0-9]{1,2},\\s*[0-9]{4}"); = Ptn.match

Data: 8 Types of Windows security mode analysis and application techniques

People who often use computers may have heard that when a computer fails, Windows provides a platform called "Safe Mode" where users can solve a lot of problems-whether it's hardware (driver) or software. But will you use this safe mode? Today we are going to show you what it really is. First knowledge of Safe mode To enter Safe mode, as long as the start of the Non-stop press F8, the menu will appear, and then use the keyboard up and down the cursor keys to choose to enter a different boot mode

Thinking about Web Application security (i)

In my thinking about Web Application Security (preface) I mentioned that the security of:web applications should not depend on the client's request information. It is well known that the,http protocol is open, so anyone can send request requests to a Web server that is exposed on the network, requiring a URL (uniform Resource Locator Uniform Resource Locator).

Open XML Application Security (2) OLE mechanism

OLE (Object Linking and embedding, objects linking and embedding) is not only a desktop application integration, but also defines and implements a mechanism that allows applications to "connect" to each other as software "objects" (Functions of data collection and manipulation data). This connection mechanism and protocol are called the part object model (Component object model,com). OLE can be used to create compound documents that contain different

Total Pages: 14 1 .... 10 11 12 13 14 Go to: Go

Contact Us

The content source of this page is from Internet, which doesn't represent Alibaba Cloud's opinion; products and services mentioned on that page don't have any relationship with Alibaba Cloud. If the content of the page makes you feel confusing, please write us an email, we will handle the problem within 5 days after receiving your email.

If you find any instances of plagiarism from the community, please send an email to: info-contact@alibabacloud.com and provide relevant evidence. A staff member will contact you within 5 working days.

A Free Trial That Lets You Build Big!

Start building with 50+ products and up to 12 months usage for Elastic Compute Service

  • Sales Support

    1 on 1 presale consultation

  • After-Sales Support

    24/7 Technical Support 6 Free Tickets per Quarter Faster Response

  • Alibaba Cloud offers highly flexible support services tailored to meet your exact needs.