*sublabel_EDS*

*custom_text_above_search_result**custom_text_above_search_result_EDS*

*Showing* 21 - 40 *of* 1*number_thousands_separator*258

21

Real-Time Operating Systems’ Compliance With MISRA-C Coding Standard: A Comprehensive Study
Song, J. ; Shigdel, R. ; Pokharel, A. ; et al.
IEEE Access Access, IEEE. 12:151955-151974 2024

*Academic Journal*
22

*This result is not displayed to guests*

23

Writing Secure Code
Hatzivasilis, George

*Dissertation/ Thesis*
25

Hacking the Code : Auditor's Guide to Writing Secure Code for the Web
Mark Burnett ; Mark Burnett

Application software--Se... Computer networks--Secur...
*eBook*
26

*This result is not displayed to guests*

27

Understanding Developer Security Archetypes
Ryan, Ita ; Roedig, Utz ; Stol, Klaas-Jan
2021 IEEE/ACM 2nd International Workshop on Engineering and Cybersecurity of Critical Systems (EnCyCriS) ENCYCRIS Engineering and Cybersecurity of Critical Systems (EnCyCriS), 2021 IEEE/ACM 2nd International Workshop on. :37-40 Jun, 2021

*Conference*
28

Django REST Framework (DRF) Secure Code Guidelines
Nader Meljem, Anuar Manuel ; Isern-Deya, Andreu Pere ; Garcia-Font, Victor ; et al.
O2, repositorio institucional de la UOC
Universitat Oberta de Catalunya (UOC)

Django enterprise security Seguridad informática --... privacitat privacidad seguretat empresarial
*Dissertation/ Thesis*
30

*This result is not displayed to guests*

31

Programming with a Purpose.
Wilson, Greg
Byte.com. 5/6/2002, pN.PAG. 0p.

COMPUTER security WRITING Secure Code (Boo... BULLETPROOFING Web Appli... GAME Design: Theory & Pr...
*Periodical*
32

*This result is not displayed to guests*

33

ASP.NET Core 5 Secure Coding Cookbook
Canlas, Roman ; Price, Ed ; Canlas, Roman ; et al.

*Electronic Resource*
34

*This result is not displayed to guests*

35

*This result is not displayed to guests*

36

May the Source Be with You: On ChatGPT, Cybersecurity, and Secure Coding
Tiago Espinha Gasiba ; Andrei-Cristian Iosif ; Ibrahim Kessba ; et al.
Information, Vol 15, Iss 9, p 572 (2024)

education training secure coding industry cybersecurity capture the flag
*Academic Journal*
37

SWART: Secure Web Application Response Tool
Sharma, Kanika ; Kumar, Naresh
2013 International Conference on Control, Computing, Communication and Materials (ICCCCM) Control Computing Communication & Materials (ICCCCM), 2013 International Conference on. :1-7 Aug, 2013

*Conference*
38

Firmware Secure Coding Practice
Jiewen Yao ; Vincent Zimmer
Building Secure Firmware ISBN: 9781484261057

*Book*
39

Cyber Security Threats of Using Generative Artificial Intelligence in Source Code Management
Sainag Nethala ; Sandeep Kampa ; Srinivas Reddy Kosna
Journal of Informatics and Web Engineering, Vol 4, Iss 2, Pp 114-124 (2025)

generative ai source code management (... cyber security threats ai-generated code vulner... code injection attacks data poisoning
*Academic Journal*
40

Eye tracking technologies to visualize secure coding behavior
Daniel Kyle Davis ; Feng Zhu
Array, Vol 15, Iss , Pp 100241- (2022)

Cybersecurity secure cod... Hands-on education learn... Software development cod... Eye tracking Eye tracking user-intera... Software vulnerabilities
*Academic Journal*

*Filter*