Difference between revisions of "ASDR TOC Control"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
  
 
# [[Access control]]
 
# [[Access control]]
#[[Authorization]]
+
# [[Address space layout randomization (ASLR)]]
#[[Authentication]]
+
# [[Authorization]]
#[[Canonicalization]]
+
# [[Authentication]]
 +
# [[Bounds Checking]]
 +
# [[Canonicalization]]
 
# [[Concurrency]]
 
# [[Concurrency]]
 
# [[Encoding]]
 
# [[Encoding]]
 
# [[Encryption]] - Ken Bolger
 
# [[Encryption]] - Ken Bolger
 
# [[Error handling]]
 
# [[Error handling]]
 +
# [[Executable space protection]]
 
# [[Hashing]]
 
# [[Hashing]]
 
# [[Identity Management]]
 
# [[Identity Management]]
Line 20: Line 23:
 
# [[Randomization]]
 
# [[Randomization]]
 
# [[Resource Locking]]
 
# [[Resource Locking]]
 +
# [[Safe Libraries]]
 
# [[Session management]]
 
# [[Session management]]
 
# [[SSL]] - Ken Bolger
 
# [[SSL]] - Ken Bolger
 +
# [[Stack-smashing Protection (SSP)]]
 +
# [[Static Code Analysis]]
 
# [[Tokenizing]]
 
# [[Tokenizing]]
 
# [[Web Application Firewall]]
 
# [[Web Application Firewall]]
 
# [[Cryptography]] - Ken Bolger
 
# [[Cryptography]] - Ken Bolger
 
Articles to add
 
* [[Bounds Checking]]
 
* [[Safe Libraries]]
 
* [[Static Code Analysis]]
 
* [[Executable space protection]]
 
* [[Address space layout randomization (ASLR)]]
 
* [[Stack-smashing Protection (SSP)]]
 
  
  

Revision as of 06:45, 16 September 2008

Back to TOC

  1. Access control
  2. Address space layout randomization (ASLR)
  3. Authorization
  4. Authentication
  5. Bounds Checking
  6. Canonicalization
  7. Concurrency
  8. Encoding
  9. Encryption - Ken Bolger
  10. Error handling
  11. Executable space protection
  12. Hashing
  13. Identity Management
  14. Input Validation
  15. Intrusion Detection
  16. Intrusion Prevention
  17. Logging
  18. Memory Management
  19. Output Validation
  20. Quotas
  21. Randomization
  22. Resource Locking
  23. Safe Libraries
  24. Session management
  25. SSL - Ken Bolger
  26. Stack-smashing Protection (SSP)
  27. Static Code Analysis
  28. Tokenizing
  29. Web Application Firewall
  30. Cryptography - Ken Bolger


Back to TOC