Website Security for Dummies

This eBook will serve as a guide to understanding the risks posed by unprotected websites, the value of using SSL certificates, and the “what” and “how” of different...

Defend Against Injection-Based Attacks

Injection vulnerabilities allow a malicious attacker to insert specific commands into an application or code that will execute undesired behavior on their behalf. These attacks...

Top Automotive Security Vulnerabilities

Trying to build connected automotive software that's both bulletproof and secure is a big task; knowing where to focus time and energy can be half the challenge. Nearly 90...

Static Code Analysis in an Agile World

To keep pace with ever-increasing customer demands on software functionality and time-to-market expectations, software developers are having to develop higher quality code...
1 4 5 6 7 8 28