This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "Java leading security practice"
From OWASP
(New page: ==Introduction== This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. ===Class Access=== #Methods...) |
|||
Line 1: | Line 1: | ||
+ | [[OWASP Code Review Guide Table of Contents]]__TOC__ | ||
+ | |||
==Introduction== | ==Introduction== | ||
This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. | This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code. | ||
Line 17: | Line 19: | ||
===Serialization/Deserialization=== | ===Serialization/Deserialization=== | ||
===Comparisons=== | ===Comparisons=== | ||
+ | |||
+ | |||
+ | [[Category:OWASP Code Review Project]] | ||
+ | [[Category:Java Leading Practice]] |
Revision as of 11:12, 14 August 2007
OWASP Code Review Guide Table of ContentsIntroduction
This section covers the main Java-centric areas which are perscribed as leading security practice when developing java applications and code.
Class Access
- Methods
- Fields
- Mutable Objects