| |||||
| |||||
Search Irongeek.com:
Help Irongeek.com pay for bandwidth and research equipment: |
Attendees of this talk will benefit from learning about what
constitutes insecure code and the associated attacks that
stem from such code. Applicable attacks ranging from injection to reversing will be demonstrated to reinforce contents
of this talk. This way, the attendee would not only be taught
about “What not to do?” but also, “Why this should not
do, what they ought not to do?”. Finally, attendees will also
be introduced to secure development processes such as
protection needs elicitation, threat modeling, code review
and analysis and secure deployment, to illustrate that while
writing secure code is one important aspect of software
security, there is more to securing applications, than what
meets the eye.
Come for a fun filled, interactive session and your chance to
win one of the personalized and autographed copies of the
speaker’s renowned book – The 7 qualities of highly secure
software.
15 most recent posts on Irongeek.com:
|
If you would like to republish one of the articles from this site on your
webpage or print journal please contact IronGeek.
Copyright 2020, IronGeek
Louisville / Kentuckiana Information Security Enthusiast