Secure Coding in Java.

Start your secure coding journey. This course provides a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats.

Saved in:
Bibliographic Details
Corporate Author: linkedin.com (Firm)
Other Authors: P Moley III, Frank (Speaker)
Format: Video
Language:English
Published: Carpenteria, CA linkedin.com, 2020.
Subjects:
Online Access:CONNECT
CONNECT
LEADER 02769ngm a22004453i 4500
001 mig00005573459
006 m c
007 vz||zazu|
007 cr cna a
008 221006s2020 cau059 o vleng d
005 20221006154052.1
035 0 0 |a ocm00000001linkedinLDC2856084 
035 |a linkedinLDC2856084 
040 |a linkedin.com  |b eng 
050 4 |a LDC2856084 
100 1 |a P Moley III, Frank  |e speaker. 
245 1 0 |a Secure Coding in Java.  |c with Frank P Moley III 
264 1 |a Carpenteria, CA  |b linkedin.com,  |c 2020. 
300 |a 1 online resource 
306 |a 00h:59m:52s 
336 |a two-dimensional moving image  |b tdi  |2 rdacontent 
337 |a video  |b v  |2 rdamedia 
337 |a computer  |b c  |2 rdamedia 
338 |a other  |b vz  |2 rdacarrier 
338 |a online resource  |b cr  |2 rdacarrier 
500 |a 11/03/202012:00:00AM 
520 |a Start your secure coding journey. This course provides a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats. 
511 1 |a Presenter: Frank P Moley III 
520 |a The enduring popularity of Java makes it a target for bad actors. And its prevalence in internal enterprise applications-which are vulnerable to attacks from employees with insider knowledge-renders secure coding practices even more critical. In this course, instructor Frank Moley helps advanced Java developers kick-start their secure coding journey, providing a high-level look at common attacks against Java applications, as well as how to prevent and defend against those threats. Frank discusses how to prevent SQL injection attacks, identify places where sensitive data is stored and avoid exposing it to the outside world, write code that protects the integrity of the system, and more. Along the way, he provides challenges that allow you to put your new skills to the test. 
538 |a Latest version of the following browsers: Chrome, Safari, Firefox, or Internet Explorer. Adobe Flash Player Plugin. JavaScript and cookies must be enabled. A broadband Internet connection. 
655 4 |a Instructional films.  |2 lcgft 
655 4 |a Educational films.  |2 lcgft 
710 2 |a linkedin.com (Firm) 
730 0 |a LinkedIn MTSU records 
856 4 0 |u https://www.linkedin.com/learning/secure-coding-in-java?u=36452436&auth=true  |z CONNECT  |3 LinkedIn.com  |t 0 
949 |a ho0 
998 |a wi 
999 f f |s 4636e94c-f0c0-4b00-b002-00090f8af506  |i a9c401a2-7694-4152-a75b-fbb3f4b76b44  |t 0 
952 f f |a Middle Tennessee State University  |b Main  |c James E. Walker Library  |d Electronic Resources  |t 1  |e LDC2856084   |h Library of Congress classification 
856 4 0 |3 LinkedIn.com  |t 0  |u https://www.linkedin.com/learning/secure-coding-in-java?u=36452436&auth=true  |z CONNECT