This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Java leading security practice"
From OWASP
(New page: ==Introduction== This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. ===Class Access=== #Methods...) |
|||
| Line 1: | Line 1: | ||
| + | [[OWASP Code Review Guide Table of Contents]]__TOC__ | ||
| + | |||
==Introduction== | ==Introduction== | ||
This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. | This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. | ||
| Line 17: | Line 19: | ||
===Serialization/Deserialization=== | ===Serialization/Deserialization=== | ||
===Comparisons=== | ===Comparisons=== | ||
| + | |||
| + | |||
| + | [[Category:OWASP Code Review Project]] | ||
| + | [[Category:Java Leading Practice]] | ||
Revision as of 11:12, 14 August 2007
OWASP Code Review Guide Table of ContentsIntroduction
This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code.
Class Access
- Methods
- Fields
- Mutable Objects