Secure coding — Part 1

With the increasing complexity of business applications, there is a need to establish clear and concise requirements for secure coding practices.

Content

- Bypass application input validation.
- XSS cross-site scripting.
- SQL injection.
- Command injection.
- Log injection.
- HTTP response splitting.

--

--

Get the Medium app

A button that says 'Download on the App Store', and if clicked it will lead you to the iOS App store
A button that says 'Get it on, Google Play', and if clicked it will lead you to the Google Play store
Alex Mosso

Alex Mosso

I solve problems to empower operations, maximize performance and increase profits.