Useful Links
Computer Science
Cybersecurity
Application Security
1. Introduction to Application Security
2. Foundational Security Principles
3. Secure Software Development Lifecycle
4. Secure Design and Architecture
5. Secure Coding Practices
6. Language-Specific Security Considerations
7. Third-Party Component Security
8. Secrets Management
9. Security Testing Methodologies
10. Common Vulnerability Categories
11. Secure Deployment and Operations
12. Vulnerability Management and Incident Response
13. Specialized Application Security Domains
14. Application Security Program Management
Third-Party Component Security
Software Composition Analysis
Dependency Discovery
Direct Dependencies
Transitive Dependencies
Shadow Dependencies
Vulnerability Assessment
Known Vulnerability Databases
Vulnerability Scoring
Risk Prioritization
License Compliance
Open Source License Types
License Compatibility
Compliance Tracking
Dependency Management Strategies
Dependency Selection Criteria
Security Track Record
Maintenance Status
Community Support
Version Management
Pinning Versions
Update Strategies
Rollback Procedures
Vulnerability Remediation
Patch Management
Alternative Solutions
Workaround Strategies
Supply Chain Security
Software Supply Chain Risks
Compromised Dependencies
Malicious Packages
Build System Attacks
Supply Chain Protection
Package Verification
Build Reproducibility
Dependency Signing
Previous
6. Language-Specific Security Considerations
Go to top
Next
8. Secrets Management