Difference between revisions of "ASDR TOC Principles"

From OWASP
Jump to: navigation, search
Line 2: Line 2:
  
 
* 1 [[Assume attackers have source code]]
 
* 1 [[Assume attackers have source code]]
* 2 [[Avoid reliance on security by obscurity]]
+
* 2 [[Avoid security by obscurity]]
 
* 3 [[CLASP Security Principles]]
 
* 3 [[CLASP Security Principles]]
 
* 4 [[Defense in depth]]
 
* 4 [[Defense in depth]]

Revision as of 16:34, 19 June 2008

Back to TOC

Back to TOC