- Compuware updates ASP.NET security tool
- Build security into the SDLC and keep the bad guys out
- Incorporation of security in development lifecycle a sea change
- IT managers, beware: US-CERT study faults app security more than Linux
- Build accountability for security into the development process
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 22: Denial of Service Atta
- Web services security -- Chapter 8, OWASP Guide to Building Secure Web Applications and Web Services
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 9: Authentication
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 19: Cryptography
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 20: Configuration
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 15: Error Handling, Auditi
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 10: Authorization
- Data validation -- Chapter 12, OWASP Guide to Building Secure Web Applications and Web Services
- About the Open Web Application Security Project
- Identity, authentication key to Web services security
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 13: Interpreter Injection
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 11: Session Management
- OWASP Guide to Building Secure Web Applications and Web Services, Chapter 17: Buffer Overflows