dcsimg
July 6, 2015
Hot Topics:

Security Section Index

Nominations for Developer.com Product of the Year Begin October 15
Help Developer.com choose the best of the best for the upcoming year.

The Basics of Manipulating File Access Control Lists with C#
Learn about file access control lists and how to use C# to read and modify them to improve the security of your applications and your IT infrastructure.

Object Integrity & Security: Error & Exceptions
One of the advantages of using object-oriented languages is that much of the error/exception handling is built directly into the language itself. Thus, many of these issues can be handled during the design of the application—and not when the application crashes in the hands of a user.

Handling Anomalies: Errors and Exceptions
When things go wrong in an application, what should the code do?

Cryptographic Solutions for .NET Developers: Hashing and Encryption
Learn how to use cryptography to improve the security of your applications. Discover the basic building blocks for encryption and hashing using C#.

Speech Authentication Strategies, Risk Mitigation, and Business Metrics
Compare the economic and technical differences among voice authenticated applications and those using traditional or other biometric methods of authentication.

  • 1
  • 2

Enterprise Development Update

Don't miss an article. Subscribe to our newsletter below.

Sitemap | Contact Us

Thanks for your registration, follow us on our social networks to keep up-to-date
Rocket Fuel