Difference between revisions of "ASDR TOC Control"

From OWASP
Jump to: navigation, search
 
(6 intermediate revisions by 2 users not shown)
Line 1: Line 1:
Back to [[ASDR_Table_of_Contents|TOC]]
+
{{template:CandidateForDeletion}}
 +
 
 +
#REDIRECT [[::Category:Control]]
 +
 
  
 
# [[Access control]]
 
# [[Access control]]
#[[Authorization]]
+
# [[Address space layout randomization (ASLR)]]
#[[Authentication]]
+
# [[Authorization]]
#[[Canonicalization]]
+
# [[Authentication]]
 +
# [[Bounds Checking]]
 +
# [[Canonicalization]]
 
# [[Concurrency]]
 
# [[Concurrency]]
 
# [[Encoding]]
 
# [[Encoding]]
# [[Encryption]] - Ken Bolger
+
# [[Encryption]]
 
# [[Error handling]]
 
# [[Error handling]]
 +
# [[Executable space protection]]
 
# [[Hashing]]
 
# [[Hashing]]
 
# [[Identity Management]]
 
# [[Identity Management]]
Line 20: Line 26:
 
# [[Randomization]]
 
# [[Randomization]]
 
# [[Resource Locking]]
 
# [[Resource Locking]]
 +
# [[Safe Libraries]]
 
# [[Session management]]
 
# [[Session management]]
# [[SSL]] - Ken Bolger
+
# [[SSL]]
 +
# [[Stack-smashing Protection (SSP)]]
 +
# [[Static Code Analysis]]
 
# [[Tokenizing]]
 
# [[Tokenizing]]
 
# [[Web Application Firewall]]
 
# [[Web Application Firewall]]
# [[Cryptography]] - Ken Bolger
+
# [[Cryptography]]
 
+
Articles to add
+
* [[Bounds Checking]]
+
* [[Safe Libraries]]
+
* [[Static Code Analysis]]
+
* [[Executable space protection]]
+
* [[Address space layout randomization (ASLR)]]
+
* [[Stack-smashing Protection (SSP)]]
+
 
+
 
+
Back to [[ASDR_Table_of_Contents|TOC]]
+
 
+
[[Category:OWASP ASDR Project]]
+

Latest revision as of 10:43, 11 April 2009


This page was marked to be reviewed for deletion.


#REDIRECT :Category:Control


  1. Access control
  2. Address space layout randomization (ASLR)
  3. Authorization
  4. Authentication
  5. Bounds Checking
  6. Canonicalization
  7. Concurrency
  8. Encoding
  9. Encryption
  10. Error handling
  11. Executable space protection
  12. Hashing
  13. Identity Management
  14. Input Validation
  15. Intrusion Detection
  16. Intrusion Prevention
  17. Logging
  18. Memory Management
  19. Output Validation
  20. Quotas
  21. Randomization
  22. Resource Locking
  23. Safe Libraries
  24. Session management
  25. SSL
  26. Stack-smashing Protection (SSP)
  27. Static Code Analysis
  28. Tokenizing
  29. Web Application Firewall
  30. Cryptography