Status Updates From Alice and Bob Learn Secure ...

Alice and Bob Learn Secure Coding Alice and Bob Learn Secure Coding
by


Status Updates Showing 1-24 of 24

order by

Steve Lu
Steve Lu is on page 80 of 416
Dec 01, 2025 05:32AM Add a comment
Alice and Bob Learn Secure Coding

Stephen
Stephen is on page 253 of 416
Nov 06, 2025 02:33PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 58% done
Complete chapter 7, which includes popular frameworks like .NET and Angular, and how to make your app safe. For instance, in Angular, type policies are controlled via the CSP header. In .NET, start by being up-to-date and using hash and encryption algorithms. Try signing serialized objects to ensure their integrity, etc.
Jul 28, 2025 04:03PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 43% done
Complete js section on chapter 6 , which contains golden tips for security related to js
Jul 19, 2025 04:52PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 41% done
Complete chapter 5 after completing the security phone and serverless and websocket
Jul 16, 2025 06:10PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 38% done
Complete part I, which put us in a good foundation , and starting on part II by chapter 5, which starts giving framework tips starting by restful api
Jul 11, 2025 09:01AM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 24% done
Sometimes, regular errors can be potential security risks and can avoid logging and its importance to know what is going on. Cryptography is a math field responsible for changing data shape, and it has two types: one-way and two-way encryption.
Jun 29, 2025 05:20AM Add a comment
Alice and Bob Learn Secure Coding

André
André is on page 22 of 416
Jun 16, 2025 08:32AM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 18% done
Read sections related to files and serialization; it is an awesome part that explores important aspects of file scanning, auditing changes through file management monitoring, and using SAST tools to test binary security. Using a WAF is a good option for extra security, as it enables ASLR security mode on the OS. Do not deserialize objects from unknown sources; try signing serialized ones.
Jun 14, 2025 12:36PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 16% done
Read the first section of Chapter 3. This section discusses databases and offers multiple recommendations to maintain their security, from a customer perspective to data masking to protect PII, and advice for development teams, such as encrypting sensitive data and avoiding the use of custom algorithms.
Jun 11, 2025 02:53PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 15% done
Complete chapter 2, which speaking about SSDLC
Jun 03, 2025 12:23PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 5% done
Chapter one concludes by continuing its tips and principles from CIA triage to defence in depth. Considering that patching is not easy, try to respect compliance and regulations. Using frameworks like OWASP will help protect; test your application as much as possible; and try to identify your threat model and don't use an obscurity as a security layer .
May 17, 2025 02:59PM Add a comment
Alice and Bob Learn Secure Coding

mohamed abotir
mohamed abotir is 3% done
Chapter 1 introduces the importance of security and lists principles like the CIA triad, least privilege, secure defaults, and zero trust. Nothing is trusted—not only humans but also other systems with which we integrate, even systems built within our company.
May 16, 2025 06:30PM Add a comment
Alice and Bob Learn Secure Coding