UsefulLinks
Computer Science
Cybersecurity
Application Security
1. Introduction to Application Security
2. Foundational Security Principles
3. Secure Software Development Lifecycle
4. Secure Design and Architecture
5. Secure Coding Practices
6. Language-Specific Security Considerations
7. Third-Party Component Security
8. Secrets Management
9. Security Testing Methodologies
10. Common Vulnerability Categories
11. Secure Deployment and Operations
12. Vulnerability Management and Incident Response
13. Specialized Application Security Domains
14. Application Security Program Management
6.
Language-Specific Security Considerations
6.1.
Java Security
6.1.1.
Common Java Vulnerabilities
6.1.1.1.
Deserialization Attacks
6.1.1.2.
XML Processing Vulnerabilities
6.1.1.3.
Reflection Abuse
6.1.2.
Secure Java Libraries
6.1.2.1.
Input Validation Libraries
6.1.2.2.
Cryptographic Libraries
6.1.2.3.
Authentication Frameworks
6.1.3.
Java Security Manager
6.1.3.1.
Security Policies
6.1.3.2.
Permission Models
6.1.3.3.
Sandboxing Applications
6.2.
Python Security
6.2.1.
Python-Specific Vulnerabilities
6.2.1.1.
Code Injection
6.2.1.2.
Pickle Deserialization
6.2.1.3.
Template Injection
6.2.2.
Secure Python Practices
6.2.2.1.
Input Sanitization
6.2.2.2.
Safe Evaluation
6.2.2.3.
Secure File Handling
6.2.3.
Python Package Security
6.2.3.1.
Dependency Scanning
6.2.3.2.
Package Verification
6.2.3.3.
Virtual Environment Security
6.3.
JavaScript and Node.js Security
6.3.1.
Client-Side JavaScript Security
6.3.1.1.
DOM Manipulation Security
6.3.1.2.
Event Handling Security
6.3.1.3.
Third-Party Script Risks
6.3.2.
Node.js Security
6.3.2.1.
Server-Side JavaScript Risks
6.3.2.2.
npm Package Security
6.3.2.3.
Prototype Pollution
6.3.3.
JavaScript Frameworks Security
6.3.3.1.
React Security Considerations
6.3.3.2.
Angular Security Features
6.3.3.3.
Vue.js Security Practices
6.4.
C and C++ Security
6.4.1.
Memory Management Security
6.4.1.1.
Buffer Overflow Prevention
6.4.1.2.
Use-After-Free Prevention
6.4.1.3.
Memory Leak Prevention
6.4.2.
Secure C/C++ Practices
6.4.2.1.
Safe String Handling
6.4.2.2.
Integer Overflow Protection
6.4.2.3.
Pointer Validation
6.4.3.
Static Analysis for C/C++
6.4.3.1.
Common Static Analysis Tools
6.4.3.2.
Code Review Techniques
6.4.3.3.
Secure Coding Standards
6.5.
.NET Security
6.5.1.
.NET Framework Security Features
6.5.1.1.
Code Access Security
6.5.1.2.
Role-Based Security
6.5.1.3.
Cryptographic Services
6.5.2.
Secure .NET Development
6.5.2.1.
Input Validation in .NET
6.5.2.2.
SQL Injection Prevention
6.5.2.3.
XSS Prevention
6.5.3.
.NET Dependency Management
6.5.3.1.
NuGet Package Security
6.5.3.2.
Assembly Verification
6.5.3.3.
Strong Naming
Previous
5. Secure Coding Practices
Go to top
Next
7. Third-Party Component Security