Related resources for SOUND Programming Methodology
  • All About OWASP #3 - Sensitive Data Exposure4/24/2019 9:34:38 AM. In this part of the study of OWASP Top 10 Threats, we will understand Threat # 3 – Sensitive Data Exposure.
  • All About OWASP #1 - SQL Injection Attack4/24/2019 4:01:32 AM. Considering security as the most important aspect of an application and as the First step in SOUND Programming Methodology, we will be covering SQL Injection Attack and Prevention.
  • All About OWASP #2 - Broken Authentication4/24/2019 4:01:05 AM. In this article, we will learn about Secure Programming of SOUND programming methodology. We will cover Broken Authentication from OWASP's top 10 security threats.