Is your code secure from attackers? Have you considered the different mechanisms that will be used to access data? Are they secure? In part one of this three-part series; you will learn established best practices for applying security principles throughout the development process. Join this webcast to learn effective strategies for defending common security threats such as buffer overruns, cross-site scripting, SQL injection, and denial of service attacks. Presenter: Anand Iyer, Developer Com...
Read more
Read more