*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 101 - 120 *of* 1*number_thousands_separator*258

101

Ultimate Rust for Systems Programming
Mahmoud Harmouch ; Mahmoud Harmouch

Computers Computer programming Language and languages Software engineering
*eBook*
102

*This result is not displayed to guests*

104

C# 10.0 All-in-One For Dummies
John Paul Mueller ; John Paul Mueller

C (Computer program lang...
*eBook*
105

*This result is not displayed to guests*

106

Implementation of techniques and OWASP security recommendations to avoid SQL and XSS attacks using J2EE and WS-Security
Guaman, Daniel ; Guaman, Franco ; Jaramillo, Danilo ; et al.
2017 12th Iberian Conference on Information Systems and Technologies (CISTI) Information Systems and Technologies (CISTI), 2017 12th Iberian Conference on. :1-7 Jun, 2017

*Conference*
107

A Secure Code Review Retrospective
Buttner, Andrew ; Piazza, Richard ; Purohit, Rushi ; et al.
2020 IEEE Secure Development (SecDev) SECDEV Secure Development (SecDev), 2020 IEEE. :31-32 Sep, 2020

*Conference*
108

Which past? Whose transcendental presupposition?
Seth, Sanjay
Postcolonial Studies. Jun2008, Vol. 11 Issue 2, p215-226. 12p.

*Academic Journal*
110

Differences between traditional network security and security in the cloud
Verbitskiy, Ilya
Henry Stewart Publications, Cyber Security: A Peer-Reviewed Journal. 8(3):281-298

*Academic Journal*
111

Parser Weakness Enumeration: Definition and Preliminary Assessment
Lam, Denley ; Li, Letitia ; Gabrielson, Anthony
2023 IEEE Secure Development Conference (SecDev) SECDEV Secure Development Conference (SecDev), 2023 IEEE. :118-125 Oct, 2023

*Conference*
112

Investigating the Changes in Software Metrics after Vulnerability is Fixed
Zhou, Andy ; Sultana, Kazi Zakia ; Samanthula, Bharath K.
2021 IEEE International Conference on Big Data (Big Data) Big Data (Big Data), 2021 IEEE International Conference on. :5658-5663 Dec, 2021

*Conference*
113

Fine-Grained, Language-Based Access Control for Database-Backed Applications
Zigmond, Ezra ; Chong, Stephen ; Dimoulas, Christos ; et al.
The Art, Science, and Engineering of Programming, 2020, Vol. 4, Issue 2, Article 3

Computer Science - Progr...
*Report*
114

*This result is not displayed to guests*

115

C++ : The Comprehensive Guide
Rheinwerk Publishing, Inc ; Torsten T. Will ; Rheinwerk Publishing, Inc ; et al.

*Book*
116

Implementación de técnicas y recomendaciones de seguridad OWASP para evitar ataques de tipo inyección SQL, XSS utilizando J2EE y WS-Security. (Spanish)
Guamán, Daniel ; Guamán, Franco ; Jaramillo, Danilo ; et al.
CISTI (Iberian Conference on Information Systems & Technologies / Conferência Ibérica de Sistemas e Tecnologias de Informação) Proceedings; 2017, Vol. 1, p1169-1175, 7p

*Conference*
117

Schrödinger's Security: Opening the Box on App Developers' Security Rationale
van der Linden, Dirk ; Anthonysamy, Pauline ; Nuseibeh, Bashar ; et al.
2020 IEEE/ACM 42nd International Conference on Software Engineering (ICSE) ICSE Software Engineering (ICSE), 2020 IEEE/ACM 42nd International Conference on. :149-160 Oct, 2020

*Conference*

*Filter*