After introduction of SOUND, As part of Secure Programming, we will be covering SQL Injection attack in detail and other OWASP top 10 Threats.
Continue readingTag: OWASP
SOUND : An Effective Coding and Code Review Technique
Here is very basic technique to integrate relevant Non-Functional Requirements in your Coding and Code Review Process and be more reliable.
Continue reading