Applications can allow computers to perform an immense number of tasks, but they can also open up a host to unwanted exploitation and vulnerability. If an application has access to edit locally stored files, but is vulnerable to unauthorized control, your locally stored files become vulnerable to unauthorized control. In this section, we will be looking at a number of security practices and principles that can enhance the security of applications. This section will cover the following topics:
- Fuzzing
- Secure coding concepts
- Cross-site scripting (XSS) prevention
- Cross-site request forgery (XSRF . . .
The content below this message is for members only.