Software today is subjected to numerous vectors of attacks. The internet world is a hostile world, and our apps need to expect to encounter digital terrorists who want to use our applications to get inside our organization. In this session, you’ll learn about some of the most common attack vectors for applications and what you can do about them. We’ll discuss techniques for protecting from user input, including injection and cross site scripting attacks.
All you have to do is fill out the form, and you’ll receive an email with a link to the pdf.
By pressing Submit, you agree to receive this content via email to the address provided. Please make sure your email address is entered correctly, and whitelist [email protected] or add us to your safe senders list, to receive these free materials.
Want more free stuff? Sign up for our newsletter to get early access to more free content like this.