Home
About CGISecurity
SecTemplates.com
QASec.com
Subscribe to this site
Topics
Advertising
About
Contact
FAQ
Links
Books
Papers
Advisories
Contributions
Security Services
RFCs
Submit News
Tags
Announcements (79)
Articles (51)
Blue Team (1)
Books (1)
Browsers (77)
Bug Bounty (1)
Buzzwords (29)
Commentary (44)
Compliance (9)
Cryptography (17)
CSRF (32)
Defense (80)
Demo (2)
Development (87)
Events (32)
Flash (13)
Forensics (15)
Funny (96)
Incidents (213)
IndustryNews (384)
Interviews (15)
Metrics (17)
Off Topic (29)
Papers (17)
Purple Team (1)
Rant (51)
Red Team (1)
Research (164)
Reviews (16)
SDL (50)
Security Tools (111)
SEO (15)
Site News (25)
Surveys (7)
Tools (28)
Vendors (38)
Vulns (168)
WASC (46)
Web Application Firewalls (18)
Worms (32)
XSS (84)
Favorite Links
The Web Application Security Consortium
The Web Security Mailing List
Romain Gaucher's Blog
Jeremiah Grossman's Blog
Translate
Pick Your Language
Choose
Spanish
English
French
German
Italian
Security Books
Archives
Recent entries...
-
Announcing SecTemplates.com release #6: Security Partner Program Pack v1
-
Announcing SecTemplates.com release #5: Security Exception Program Pack 1.0
-
Announcing SecTemplates.com release #4: Vulnerability Management Program Release Pack 1.0
-
Announcing SecTemplates.com release #3: Bug bounty program pack 1.0
-
Announcing SecTemplates.com release #2: External penetration testing program pack 1.0
-
Announcing SecTemplates.com and the incident response program pack 1.0
-
20 years of CGISecurity: What appsec looked like in the year 2000
-
My experience coleading purple team
-
oAuth nightmares talk
-
Extensive IOS hacking guide released by Security Innovation
Twitter
Sponsored Ads
Popular Pages
Website Security
Browser Security
Phishing
RSS Security
Web Security Questions
Database Security
Web Server Security
Application Server Security
Security Documentation
Cross Site Scripting
XSS
Cross-site Request Forgery
SQL Injection
Web Services Security
AJAX Security
.NET Security
Java Security
XML Security
Application Firewalls
IIS Security
Apache Security
Oracle Security
MySQL Security
Microsoft SQL Server Security
URL Scan
Mod Security
Penetration Testing
Security News
Sponsored Ads
The Web Security Mailing List
Java Security
Sun stuff:
Sun j2EE
Building Biometric Authentication for J2EE, Web, and Enterprise Applications
Sun Java 2 Platform Enterprise Edition Specification, v1.3
Java Security API
Chronology of security-related bugs and issues, 11/19/02
Low Level Security in Java
Java Security FAQ
Java security articles
:
Patterns-Driven Security Design for J2EE Applications and Web Services
Security Patterns for J2EE Applications, Web Services, Identity Management, and Service Provisioning
Cracking Java byte-code encryption: Why Java obfuscation schemes based on byte-code encryption won't work
Java vs. .NET Security, Part 1
Java vs. .NET Security, Part 2
J2ee and .Net security,
(PDF)
Twelve rules for developing more secure Java code
Top Ten Errors Java Programmers Make
Secure a Web application, Java-style
JSP Security
Security FAQ Home Page
David A. Wheeler's Java Security Tutorial
(PDF)
A Comparison between Java and ActiveX Security, 10th October 1997
(HTML)
Java newsgroups:
comp.lang.java.programmer
comp.lang.java.security
comp.lang.java.developer
comp.lang.java.help
Comments
You can follow this conversation by subscribing to the
comment feed
for this post.
All Comments are Moderated and will be delayed!
Post a comment
Name:
Email Address:
URL:
Remember personal info?
Comments:
Comments
All Comments are Moderated and will be delayed!
Post a comment