{"id":6186,"date":"2022-11-17T20:21:10","date_gmt":"2022-11-17T20:21:10","guid":{"rendered":"https:\/\/sajinshivdas.com\/security\/?p=6186"},"modified":"2023-03-27T08:32:51","modified_gmt":"2023-03-27T08:32:51","slug":"application-security-learning-resources","status":"publish","type":"post","link":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/","title":{"rendered":"Application Security Learning Resources"},"content":{"rendered":"[vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]Articles<\/p>\n<p>Books<\/p>\n[\/vc_column_text][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/2&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<blockquote>\n<h2>Application Security Learning Resources<\/h2>\n<\/blockquote>\n[\/vc_column_text][nectar_single_testimonial testimonial_style=&#8221;basic&#8221; quote=&#8221;Here is a collection of links specifically for anyone interested in learning more about application security. Comprises reading materials, online resources, blog entries, and tests of individual competence.&#8221;][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin: 0in; font-family: Calibri; font-size: 16.0pt; color: black;\">General<\/h3>\n[\/heading][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin: 0in; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/sockpuppet.org\/blog\/2014\/02\/25\/safely-generate-random-numbers\/\">How to Safely Generate a Random Number\u00a0<\/a> &#8211; Released: February 25, 2014 : Advice on cryptographically secure pseudo-random number generators.<\/p>\n<p><a href=\"https:\/\/crackstation.net\/hashing-security.htm\">Salted Password Hashing &#8211; Doing it Right (2014)<\/a> &#8211; Released: August 6, 2014 : A post on Crackstation, a project by Defuse Security<\/p>\n<p><a href=\"http:\/\/insanecoding.blogspot.co.uk\/2014\/05\/a-good-idea-with-bad-usage-devurandom.html\">A good idea with bad usage: \/dev\/urandom<\/a>\u00a0(2014) &#8211; Released: May 3, 2014 : Mentions many ways to make\u00a0\/dev\/urandom\u00a0fail on Linux\/BSD.<\/p>\n<p><a href=\"https:\/\/paragonie.com\/white-paper\/2015-why-invest-application-security\">Why Invest in Application Security?<\/a>\u00a0(2015) &#8211; Released: June 21, 2015\u00a0 : Running a business requires being cost-conscious and minimizing unnecessary spending. The benefits of ensuring in the security of your application are invisible to most companies, so often times they neglect to invest in secure software development as a cost-saving measure. What these companies don&#8217;t realize is the potential cost (both financial and to brand reputation) a preventable data compromise can incur. The average data breach costs millions of dollars in damage. Investing more time and personnel to develop secure software is, for most companies, worth it to minimize this unnecessary risk to their bottom line.<\/p>\n<p><a href=\"https:\/\/freedom-to-tinker.com\/blog\/jbonneau\/be-wary-of-one-time-pads-and-other-crypto-unicorns\/\">Be wary of one-time pads and other crypto unicorns<\/a>\u00a0(2015) &#8211; Released: March 25, 2015 : A\u00a0must-read\u00a0for anyone looking to build their own cryptography features.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/mdsec.net\/wahh\">Web Application Hacker&#8217;s Handbook<\/a>\u00a0(2011) &#8211; Released: September 27, 2011 : Great introduction to Web Application Security; though slightly dated.<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Cryptography-Engineering-Principles-Practical-Applications\/dp\/0470474246\">Cryptography Engineering<\/a>\u00a0(2010) &#8211; Released: March 15, 2010 : Develops a sense of professional paranoia while presenting crypto design techniques.<\/p>\n<p><a href=\"https:\/\/www.manning.com\/books\/securing-devops?a_aid=securingdevops&amp;a_bid=1353bcd8\">Securing DevOps<\/a>\u00a0(2018) &#8211; Released: March 1, 2018 : Securing DevOps explores how the techniques of DevOps and Security should be applied together to make cloud services safer. This introductory book reviews state of the art practices used in securing web applications and their infrastructure, and teaches you techniques to integrate security directly into your product.<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Gray-Hat-Python-Programming-Engineers\/dp\/1593271921\">Gray Hat Python: Programming for Hackers and Reverse Engineers<\/a>\u00a0(2009) &#8211; Released: May 3, 2009<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/The-Software-Security-Assessment-Vulnerabilities\/dp\/0321444426\/\">The Art of Software Security Assessment: Identifying and Preventing Software Vulnerabilities<\/a>\u00a0(2006) &#8211; Released: November 30, 2006<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Interfaces-Implementations-Techniques-Creating-Reusable\/dp\/0201498413\/\">C Interfaces and Implementations: Techniques for Creating Reusable Software<\/a>\u00a0(1996) &#8211; Released: August 30, 1996<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Reversing-Secrets-Engineering-Eldad-Eilam\/dp\/0764574817\">Reversing: Secrets of Reverse Engineering<\/a>\u00a0(2005)\u00a0 &#8211; Released: April 15, 2005<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/JavaScript-Good-Parts-Douglas-Crockford\/dp\/0596517742\">JavaScript: The Good parts<\/a>\u00a0(2008) &#8211; Released: May 1, 2008<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Windows%C2%AE-Internals-Including-Developer-Reference\/dp\/0735625301\">Windows Internals: Including Windows Server 2008 and Windows Vista, Fifth Edition\u00a0<\/a>(2007) &#8211; Released: June 17, 2007<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/The-Hackers-Handbook-Charlie-Miller\/dp\/0470395362\">The Mac Hacker&#8217;s Handbook<\/a>\u00a0(2009) &#8211; Released: March 3, 2009<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/The-IDA-Pro-Book-Disassembler\/dp\/1593271786\">The IDA Pro Book: The Unofficial Guide to the World&#8217;s Most Popular Disassembler<\/a>\u00a0(2008) &#8211; Released: August 22, 2008<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Internetworking-TCP-Vol-Implementation-Internals\/dp\/0139738436\">Internetworking with TCP\/IP Vol. II: ANSI C Version: Design, Implementation, and Internals (3rd Edition)<\/a>\u00a0(1998) &#8211; Released: June 25, 1998<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Network-Algorithmics-Interdisciplinary-Designing-Networking\/dp\/0120884771\">Network Algorithmics,: An Interdisciplinary Approach to Designing Fast Networked Devices<\/a>\u00a0(2004)\u00a0 &#8211; Released: December 29, 2004<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Computation-Structures-Electrical-Engineering-Computer\/dp\/0262231395\">Computation Structures (MIT Electrical Engineering and Computer Science)<\/a>\u00a0(1989) &#8211; Released: December 13, 1989<\/p>\n<p><a href=\"http:\/\/www.amazon.com\/Surreptitious-Software-Obfuscation-Watermarking-Tamperproofing\/dp\/0321549252\">Surreptitious Software: Obfuscation, Watermarking, and Tamperproofing for Software Protection<\/a>\u00a0(2009) &#8211; Released: August 3, 2009<\/p>\n<p><a href=\"http:\/\/www.dwheeler.com\/secure-programs\/\">Secure Programming HOWTO<\/a>\u00a0(2015) &#8211; Released: March 1, 2015<\/p>\n<p><a href=\"https:\/\/www.cl.cam.ac.uk\/~rja14\/book.html\">Security Engineering &#8211; Second Edition<\/a>\u00a0(2008) &#8211; Released: April 14, 2008<\/p>\n<p><a href=\"https:\/\/www.feistyduck.com\/books\/bulletproof-ssl-and-tls\/\">Bulletproof SSL and TLS<\/a>\u00a0(2014) &#8211; Released: August 1, 2014<\/p>\n<p><a href=\"https:\/\/leanpub.com\/holistic-infosec-for-web-developers\">Holistic Info-Sec for Web Developers (Fascicle 0)<\/a>\u00a0(2016) &#8211; Released: September 17, 2016 : The first part of a three part book series providing broad and in-depth coverage on what web developers and architects need to know in order to create robust, reliable, maintainable and secure software, networks and other, that are delivered continuously, on time, with no nasty surprises.<\/p>\n<p><a href=\"https:\/\/leanpub.com\/holistic-infosec-for-web-developers-fascicle1-vps-network-cloud-webapplications\">Holistic Info-Sec for Web Developers (Fascicle 1)<\/a> &#8211; The second part of a three part book series providing broad and in-depth coverage on what web developers and architects need to know in order to create robust, reliable, maintainable and secure software, VPS, networks, cloud and web applications, that are delivered continuously, on time, with no nasty surprises.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Classes<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"https:\/\/www.cs.fsu.edu\/~redwood\/OffensiveComputerSecurity\/\">Offensive Computer Security (CIS 4930) FSU<\/a> &#8211; A vulnerability research and exploit development class by Owen Redwood of Florida State University.<\/p>\n<p><a href=\"https:\/\/github.com\/isislab\/Hack-Night\">Hack Night<\/a> &#8211; Developed from the materials of NYU Poly&#8217;s old Penetration Testing and Vulnerability Analysis course, Hack Night is a sobering introduction to offensive security. A lot of complex technical content is covered very quickly as students are introduced to a wide variety of complex and immersive topics over thirteen weeks.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Websites<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/www.hackthissite.org\/\">Hack This Site!<\/a> &#8211; Learn about application security by attempting to hack this website.<\/p>\n<p><a href=\"http:\/\/www.enigmagroup.org\/\">Enigma Group<\/a> &#8211; Where hackers and security experts come to train.<\/p>\n<p><a href=\"https:\/\/timoh6.github.io\/WebAppSecQuiz\/\">Web App Sec Quiz<\/a> &#8211; Self-assessment quiz for web application security<\/p>\n<p><a href=\"https:\/\/securepasswords.info\/\">SecurePasswords.info<\/a> &#8211; Secure passwords in several languages\/frameworks.<\/p>\n<p><a href=\"http:\/\/lzone.de\/cheat-sheet\/Security-News-Feeds\">Security News Feeds Cheat-Sheet<\/a> &#8211; A list of security news sources.<\/p>\n<p><a href=\"http:\/\/opensecuritytraining.info\/\">Open Security Training<\/a> &#8211; Video courses on low-level x86 programming, hacking, and forensics.<\/p>\n<p><a href=\"https:\/\/microcorruption.com\/login\">MicroCorruption<\/a> &#8211; Capture The Flag &#8211; Learn Assembly and Embedded Device Security<\/p>\n<p><a href=\"http:\/\/cryptopals.com\/\">The Matasano Crypto Challenges<\/a> &#8211; A series of programming exercises for teaching oneself\u00a0cryptography by\u00a0<a href=\"http:\/\/matasano.com\/\">Matasano Security<\/a>.\u00a0<a href=\"https:\/\/blog.pinboard.in\/2013\/04\/the_matasano_crypto_challenges\">The introduction<\/a>\u00a0by Maciej Ceglowski explains it well.<\/p>\n<p><a href=\"https:\/\/pentesterlab.com\/\">PentesterLab<\/a> &#8211; PentesterLab provides\u00a0<a href=\"https:\/\/pentesterlab.com\/exercises\/\">free Hands-On exercises<\/a>\u00a0and a\u00a0<a href=\"https:\/\/pentesterlab.com\/bootcamp\/\">bootcamp<\/a>\u00a0to get started.<\/p>\n<p><a href=\"https:\/\/bkimminich.github.io\/juice-shop\">Juice Shop<\/a>\u00a0 &#8211; An intentionally insecure Javascript Web Application.<\/p>\n<p><a href=\"http:\/\/hackyourselffirst.troyhunt.com\/\">Supercar Showdown<\/a> &#8211; How to go on the offence before online attackers do.<\/p>\n<p><a href=\"https:\/\/github.com\/owasp\/nodegoat\">OWASP NodeGoat<\/a> &#8211; Purposly vulnerable to the OWASP Top 10 Node.JS web application, with\u00a0<a href=\"https:\/\/nodegoat.herokuapp.com\/tutorial\">tutorials<\/a>,\u00a0<a href=\"https:\/\/github.com\/OWASP\/NodeGoat\/wiki\/NodeGoat-Security-Regression-tests-with-ZAP-API\">security regression testing with the OWASP Zap API<\/a>,\u00a0<a href=\"https:\/\/github.com\/owasp\/nodegoat#option-3---run-nodegoat-on-docker\">docker image<\/a>. With several options to get up and running fast.<\/p>\n<p><a href=\"https:\/\/securingthestack.com\/\">Securing The Stack<\/a> &#8211; Bi-Weekly Appsec Tutorials<\/p>\n<p><a href=\"https:\/\/www.owasp.org\/index.php\/OWASP_Serverless_Goat\">OWASP ServerlessGoat<\/a> &#8211; OWASP ServerlessGoat is a deliberately insecure realistic AWS Lambda serverless application, maintained by OWASP and created by\u00a0<a href=\"https:\/\/www.puresec.io\/\">PureSec<\/a>. You can install WebGoat, learn about the vulnerabilities, how to exploit them, and how to remediate each issue. The project also includes documentation explaining the issues and how they should be remediated with best-practices.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Blogs<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"http:\/\/cryptofails.com\/\">Crypto Fails<\/a> &#8211; Showcasing bad cryptography<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.nccgroup.trust\/us\/about-us\/newsroom-and-events\/blog\/\">NCC Group &#8211; Blog<\/a> &#8211; The blog of NCC Group, formerly Matasano, iSEC Partners, and NGS Secure.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/scotthelme.co.uk\/\">Scott Helme<\/a> &#8211; Learn about security and performance.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.cossacklabs.com\/blog-archive\/\">Cossack Labs blog<\/a>\u00a0(2018) &#8211; Blog of cryptographic company that makes open-source libraries and tools, and describes practical data security approaches for applications and infrastructures.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.owasp.org\/index.php\/Category:OWASP_Top_Ten_Project\">OWASP Top Ten Project<\/a> &#8211; The top ten most common and critical security vulnerabilities found in web applications.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Tools<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.ssllabs.com\/\">Qualys SSL Labs<\/a> &#8211; The infamous suite of SSL and TLS tools.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/securityheaders.io\/\">securityheaders.io<\/a> &#8211; Quickly and easily assess the security of your HTTP response headers.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/report-uri.io\/\">report-uri.io<\/a> &#8211; A free CSP and HPKP reporting service.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/clickjacker.io\/\">clickjacker.io<\/a> &#8211; Test and learn Clickjacking. Make clickjacking PoC, take screenshot and share link. You can test HTTPS, HTTP, intranet &amp; internal sites.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">AWS Lambda<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.puresec.io\/function-shield\">PureSec FunctionShield<\/a> &#8211; FunctionShield is a 100% free AWS Lambda security and Google Cloud Functions security library that equips developers with the ability to easily enforce strict security controls on serverless runtimes.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><strong>Android<\/strong><\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.securecoding.cert.org\/confluence\/display\/android\/Android+Secure+Coding+Standard\">SEI CERT Android Secure Coding Standard<\/a>\u00a0(2015) &#8211; Released: February 24, 2015<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">A community-maintained Wiki detailing secure coding standards for Android development.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h2 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">C<\/h2>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.securecoding.cert.org\/confluence\/display\/c\/SEI+CERT+C+Coding+Standard\">SEI CERT C Coding Standard<\/a>\u00a0(2006) &#8211; Released: May 24, 2006<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\">A community-maintained Wiki detailing secure coding standards for C programming.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/docs.fedoraproject.org\/en-US\/Fedora_Security_Team\/1\/html\/Defensive_Coding\/index.html\">Defensive Coding: A Guide to Improving Software Security by the Fedora Security Team<\/a>\u00a0(2022) &#8211; Released: May 23, 2022 : Provides guidelines for improving software security through secure coding. Covers common programming languages and libraries, and focuses on concrete recommendations.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h2 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">C++<\/h2>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.securecoding.cert.org\/confluence\/pages\/viewpage.action?pageId=637\">SEI CERT C++ Coding Standard<\/a>\u00a0(2006) &#8211; Released: July 18, 2006 &#8211; A community-maintained Wiki detailing secure coding standards for C++ programming.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">C Sharp<\/p>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"http:\/\/securitydriven.net\/\"><span lang=\"en-US\">Security Driven .NET<\/span><\/a><span lang=\"en-US\">\u00a0(2015) &#8211; Released: July 14, 2015 : An introduction to developing secure applications targeting version 4.5 of the .NET Framework, specifically covering cryptography and security engineering topics.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Clojure<\/p>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Repositories<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/github.com\/nubank\/clj-owasp\"><span lang=\"en-AE\">Clojure OWASP<\/span><\/a><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">(2020) &#8211; Released: May 5, 2020 Repository with Clojure examples of OWASP top 10 vulnerabilities.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Go<\/p>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/spacetime.dev\/memory-security-go\"><span lang=\"en-AE\">Memory Security in Go &#8211; spacetime.dev<\/span><\/a><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">(2017) &#8211; Released: August 3, 2017 : A guide to managing sensitive data in memory.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Java<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/www.securecoding.cert.org\/confluence\/display\/java\/SEI+CERT+Oracle+Coding+Standard+for+Java\">SEI CERT Java Coding Standard<\/a>\u00a0(2007) &#8211; Released: January 12, 2007 : A community-maintained Wiki detailing secure coding standards for Java programming.<\/p>\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"http:\/\/www.oracle.com\/technetwork\/java\/seccodeguide-139067.html\">Secure Coding Guidelines for Java SE<\/a>\u00a0(2014) &#8211; Released: April 2, 2014 : Secure Java programming guidelines straight from Oracle.<\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Node.js<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]\n<p lang=\"en-US\" style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/blog.risingstack.com\/node-js-security-checklist\/\">Node.js Security Checklist &#8211; Rising Stack Blog<\/a>\u00a0(2015) &#8211; Released: October 13, 2015 : Covers a lot of useful information for developing secure Node.js applications.<\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/github.com\/doyensec\/awesome-electronjs-hacking\"><span lang=\"en-US\">Awesome Electron.js hacking &amp; pentesting resources<\/span><\/a><span lang=\"en-US\">\u00a0(2020) &#8211; Released: June 17, 2020 : A curated list of resources to secure Electron.js-based applications.<\/span><\/p>\n<p style=\"margin: 0in; font-family: Calibri; font-size: 11.0pt;\"><a href=\"https:\/\/leanpub.com\/nodejssecurity\"><span lang=\"en-US\">Essential Node.js Security<\/span><\/a><span lang=\"en-US\">\u00a0(2017) &#8211; Released: July 19, 2017 : Hands-on and abundant with source code for a practical guide to Securing Node.js web applications.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">PHP<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/blog.ircmaxell.com\/2014\/11\/its-all-about-time.html\">It&#8217;s All About Time<\/a>\u00a0(2014) &#8211; Released: November 28, 2014 : A gentle introduction to timing attacks in PHP applications<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/04\/secure-authentication-php-with-long-term-persistence\">Secure Authentication in PHP with Long-Term Persistence<\/a>\u00a0(2015) &#8211; Released: April 21, 2015 : Discusses password policies, password storage, &#8220;remember me&#8221; cookies, and account recovery.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.astrumfutura.com\/2013\/04\/20-point-list-for-preventing-cross-site-scripting-in-php\">20 Point List For Preventing Cross-Site Scripting In PHP<\/a>\u00a0(2013) &#8211; Released: April 22, 2013 : Padriac Brady&#8217;s advice on building software that isn&#8217;t vulnerable to XSS<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.cyberciti.biz\/tips\/php-security-best-practices-tutorial.html\">25 PHP Security Best Practices For Sys Admins<\/a>\u00a0(2011) &#8211; Released: November 23, 2011 : Though this article is a few years old, much of its advice is still relevant as we veer around the corner towards PHP 7.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/timoh6.github.io\/2014\/06\/16\/PHP-data-encryption-cheatsheet.html\">PHP data encryption primer<\/a>\u00a0(2014) &#8211; Released: June 16, 2014 : @timoh6 explains implementing data encryption in PHP<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/05\/preventing-sql-injection-in-php-applications-easy-and-definitive-guide\">Preventing SQL Injection in PHP Applications &#8211; the Easy and Definitive Guide<\/a>\u00a0(2014) &#8211; Released: May 26, 2014 TLDR\u00a0&#8211; don&#8217;t escape, use prepared statements instead!<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/08\/you-wouldnt-base64-a-password-cryptography-decoded\">You Wouldn&#8217;t Base64 a Password &#8211; Cryptography Decoded<\/a>\u00a0(2015) &#8211; Released: August 7, 2015 : A human-readable overview of commonly misused cryptography terms and fundamental concepts, with example code in PHP.<\/p>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re confused about cryptography terms, start here. &#8211; <a href=\"https:\/\/paragonie.com\/white-paper\/2015-secure-php-data-encryption\">A Guide to Secure Data Encryption in PHP Applications<\/a>\u00a0(2015)\u00a0 &#8211; Released: August 2, 2015 : Discusses the importance of end-to-end network-layer encryption (HTTPS) as well as secure encryption for data at rest, then introduces the specific cryptography tools that developers should use for specific use cases, whether they use\u00a0<a href=\"https:\/\/pecl.php.net\/package\/libsodium\">libsodium<\/a>,\u00a0<a href=\"https:\/\/github.com\/defuse\/php-encryption\">Defuse Security&#8217;s secure PHP encryption library<\/a>, or OpenSSL.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2017\/12\/2018-guide-building-secure-php-software\">The 2018 Guide to Building Secure PHP Software<\/a>\u00a0(2017) &#8211; Released: December 12, 2017 : This guide should serve as a complement to the e-book,\u00a0<a href=\"http:\/\/www.phptherightway.com\/\">PHP: The Right Way<\/a>, with a strong emphasis on security and not general PHP programmer topics (e.g. code style).[\/vc_column_text][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/leanpub.com\/securingphp-coreconcepts\"><span lang=\"en-AE\">Securing PHP: Core Concepts<\/span><\/a><span lang=\"en-AE\"> &#8211; <\/span><span lang=\"en-AE\" style=\"font-style: italic;\">Securing PHP: Core Concepts<\/span><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">acts as a guide to some of the most common security terms and provides some examples of them in every day PHP.<\/span><\/p>\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/paragonie.com\/book\/pecl-libsodium\"><span lang=\"en-AE\">Using Libsodium in PHP Projects<\/span><\/a><span lang=\"en-US\"> &#8211; <\/span><span lang=\"en-AE\">You shouldn&#8217;t need a Ph.D in Applied Cryptography to build a secure web application. Enter libsodium, which allows developers to develop fast, secure, and reliable applications without needing to know what a stream cipher even is.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">PHP<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/blog.ircmaxell.com\/2014\/11\/its-all-about-time.html\">It&#8217;s All About Time<\/a>\u00a0(2014) &#8211; Released: November 28, 2014 : A gentle introduction to timing attacks in PHP applications<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/04\/secure-authentication-php-with-long-term-persistence\">Secure Authentication in PHP with Long-Term Persistence<\/a>\u00a0(2015) &#8211; Released: April 21, 2015 : Discusses password policies, password storage, &#8220;remember me&#8221; cookies, and account recovery.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.astrumfutura.com\/2013\/04\/20-point-list-for-preventing-cross-site-scripting-in-php\">20 Point List For Preventing Cross-Site Scripting In PHP<\/a>\u00a0(2013) &#8211; Released: April 22, 2013 : Padriac Brady&#8217;s advice on building software that isn&#8217;t vulnerable to XSS<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.cyberciti.biz\/tips\/php-security-best-practices-tutorial.html\">25 PHP Security Best Practices For Sys Admins<\/a>\u00a0(2011) &#8211; Released: November 23, 2011 : Though this article is a few years old, much of its advice is still relevant as we veer around the corner towards PHP 7.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/timoh6.github.io\/2014\/06\/16\/PHP-data-encryption-cheatsheet.html\">PHP data encryption primer<\/a>\u00a0(2014) &#8211; Released: June 16, 2014 : @timoh6 explains implementing data encryption in PHP<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/05\/preventing-sql-injection-in-php-applications-easy-and-definitive-guide\">Preventing SQL Injection in PHP Applications &#8211; the Easy and Definitive Guide<\/a>\u00a0(2014) &#8211; Released: May 26, 2014 TLDR\u00a0&#8211; don&#8217;t escape, use prepared statements instead!<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/08\/you-wouldnt-base64-a-password-cryptography-decoded\">You Wouldn&#8217;t Base64 a Password &#8211; Cryptography Decoded<\/a>\u00a0(2015) &#8211; Released: August 7, 2015 : A human-readable overview of commonly misused cryptography terms and fundamental concepts, with example code in PHP.<\/p>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re confused about cryptography terms, start here. &#8211; <a href=\"https:\/\/paragonie.com\/white-paper\/2015-secure-php-data-encryption\">A Guide to Secure Data Encryption in PHP Applications<\/a>\u00a0(2015)\u00a0 &#8211; Released: August 2, 2015 : Discusses the importance of end-to-end network-layer encryption (HTTPS) as well as secure encryption for data at rest, then introduces the specific cryptography tools that developers should use for specific use cases, whether they use\u00a0<a href=\"https:\/\/pecl.php.net\/package\/libsodium\">libsodium<\/a>,\u00a0<a href=\"https:\/\/github.com\/defuse\/php-encryption\">Defuse Security&#8217;s secure PHP encryption library<\/a>, or OpenSSL.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2017\/12\/2018-guide-building-secure-php-software\">The 2018 Guide to Building Secure PHP Software<\/a>\u00a0(2017) &#8211; Released: December 12, 2017 : This guide should serve as a complement to the e-book,\u00a0<a href=\"http:\/\/www.phptherightway.com\/\">PHP: The Right Way<\/a>, with a strong emphasis on security and not general PHP programmer topics (e.g. code style).[\/vc_column_text][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/leanpub.com\/securingphp-coreconcepts\"><span lang=\"en-AE\">Securing PHP: Core Concepts<\/span><\/a><span lang=\"en-AE\"> &#8211; <\/span><span lang=\"en-AE\" style=\"font-style: italic;\">Securing PHP: Core Concepts<\/span><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">acts as a guide to some of the most common security terms and provides some examples of them in every day PHP.<\/span><\/p>\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/paragonie.com\/book\/pecl-libsodium\"><span lang=\"en-AE\">Using Libsodium in PHP Projects<\/span><\/a><span lang=\"en-US\"> &#8211; <\/span><span lang=\"en-AE\">You shouldn&#8217;t need a Ph.D in Applied Cryptography to build a secure web application. Enter libsodium, which allows developers to develop fast, secure, and reliable applications without needing to know what a stream cipher even is.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">PHP<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/blog.ircmaxell.com\/2014\/11\/its-all-about-time.html\">It&#8217;s All About Time<\/a>\u00a0(2014) &#8211; Released: November 28, 2014 : A gentle introduction to timing attacks in PHP applications<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/04\/secure-authentication-php-with-long-term-persistence\">Secure Authentication in PHP with Long-Term Persistence<\/a>\u00a0(2015) &#8211; Released: April 21, 2015 : Discusses password policies, password storage, &#8220;remember me&#8221; cookies, and account recovery.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.astrumfutura.com\/2013\/04\/20-point-list-for-preventing-cross-site-scripting-in-php\">20 Point List For Preventing Cross-Site Scripting In PHP<\/a>\u00a0(2013) &#8211; Released: April 22, 2013 : Padriac Brady&#8217;s advice on building software that isn&#8217;t vulnerable to XSS<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.cyberciti.biz\/tips\/php-security-best-practices-tutorial.html\">25 PHP Security Best Practices For Sys Admins<\/a>\u00a0(2011) &#8211; Released: November 23, 2011 : Though this article is a few years old, much of its advice is still relevant as we veer around the corner towards PHP 7.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/timoh6.github.io\/2014\/06\/16\/PHP-data-encryption-cheatsheet.html\">PHP data encryption primer<\/a>\u00a0(2014) &#8211; Released: June 16, 2014 : @timoh6 explains implementing data encryption in PHP<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/05\/preventing-sql-injection-in-php-applications-easy-and-definitive-guide\">Preventing SQL Injection in PHP Applications &#8211; the Easy and Definitive Guide<\/a>\u00a0(2014) &#8211; Released: May 26, 2014 TLDR\u00a0&#8211; don&#8217;t escape, use prepared statements instead!<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/08\/you-wouldnt-base64-a-password-cryptography-decoded\">You Wouldn&#8217;t Base64 a Password &#8211; Cryptography Decoded<\/a>\u00a0(2015) &#8211; Released: August 7, 2015 : A human-readable overview of commonly misused cryptography terms and fundamental concepts, with example code in PHP.<\/p>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re confused about cryptography terms, start here. &#8211; <a href=\"https:\/\/paragonie.com\/white-paper\/2015-secure-php-data-encryption\">A Guide to Secure Data Encryption in PHP Applications<\/a>\u00a0(2015)\u00a0 &#8211; Released: August 2, 2015 : Discusses the importance of end-to-end network-layer encryption (HTTPS) as well as secure encryption for data at rest, then introduces the specific cryptography tools that developers should use for specific use cases, whether they use\u00a0<a href=\"https:\/\/pecl.php.net\/package\/libsodium\">libsodium<\/a>,\u00a0<a href=\"https:\/\/github.com\/defuse\/php-encryption\">Defuse Security&#8217;s secure PHP encryption library<\/a>, or OpenSSL.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2017\/12\/2018-guide-building-secure-php-software\">The 2018 Guide to Building Secure PHP Software<\/a>\u00a0(2017) &#8211; Released: December 12, 2017 : This guide should serve as a complement to the e-book,\u00a0<a href=\"http:\/\/www.phptherightway.com\/\">PHP: The Right Way<\/a>, with a strong emphasis on security and not general PHP programmer topics (e.g. code style).[\/vc_column_text][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/leanpub.com\/securingphp-coreconcepts\"><span lang=\"en-AE\">Securing PHP: Core Concepts<\/span><\/a><span lang=\"en-AE\"> &#8211; <\/span><span lang=\"en-AE\" style=\"font-style: italic;\">Securing PHP: Core Concepts<\/span><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">acts as a guide to some of the most common security terms and provides some examples of them in every day PHP.<\/span><\/p>\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/paragonie.com\/book\/pecl-libsodium\"><span lang=\"en-AE\">Using Libsodium in PHP Projects<\/span><\/a><span lang=\"en-US\"> &#8211; <\/span><span lang=\"en-AE\">You shouldn&#8217;t need a Ph.D in Applied Cryptography to build a secure web application. Enter libsodium, which allows developers to develop fast, secure, and reliable applications without needing to know what a stream cipher even is.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; id=&#8221;Tools&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221; gradient_type=&#8221;default&#8221; shape_type=&#8221;&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">PHP<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Articles<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"http:\/\/blog.ircmaxell.com\/2014\/11\/its-all-about-time.html\">It&#8217;s All About Time<\/a>\u00a0(2014) &#8211; Released: November 28, 2014 : A gentle introduction to timing attacks in PHP applications<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/04\/secure-authentication-php-with-long-term-persistence\">Secure Authentication in PHP with Long-Term Persistence<\/a>\u00a0(2015) &#8211; Released: April 21, 2015 : Discusses password policies, password storage, &#8220;remember me&#8221; cookies, and account recovery.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/blog.astrumfutura.com\/2013\/04\/20-point-list-for-preventing-cross-site-scripting-in-php\">20 Point List For Preventing Cross-Site Scripting In PHP<\/a>\u00a0(2013) &#8211; Released: April 22, 2013 : Padriac Brady&#8217;s advice on building software that isn&#8217;t vulnerable to XSS<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"http:\/\/www.cyberciti.biz\/tips\/php-security-best-practices-tutorial.html\">25 PHP Security Best Practices For Sys Admins<\/a>\u00a0(2011) &#8211; Released: November 23, 2011 : Though this article is a few years old, much of its advice is still relevant as we veer around the corner towards PHP 7.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/timoh6.github.io\/2014\/06\/16\/PHP-data-encryption-cheatsheet.html\">PHP data encryption primer<\/a>\u00a0(2014) &#8211; Released: June 16, 2014 : @timoh6 explains implementing data encryption in PHP<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/05\/preventing-sql-injection-in-php-applications-easy-and-definitive-guide\">Preventing SQL Injection in PHP Applications &#8211; the Easy and Definitive Guide<\/a>\u00a0(2014) &#8211; Released: May 26, 2014 TLDR\u00a0&#8211; don&#8217;t escape, use prepared statements instead!<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2015\/08\/you-wouldnt-base64-a-password-cryptography-decoded\">You Wouldn&#8217;t Base64 a Password &#8211; Cryptography Decoded<\/a>\u00a0(2015) &#8211; Released: August 7, 2015 : A human-readable overview of commonly misused cryptography terms and fundamental concepts, with example code in PHP.<\/p>\n<p>&nbsp;<\/p>\n<p>If you&#8217;re confused about cryptography terms, start here. &#8211; <a href=\"https:\/\/paragonie.com\/white-paper\/2015-secure-php-data-encryption\">A Guide to Secure Data Encryption in PHP Applications<\/a>\u00a0(2015)\u00a0 &#8211; Released: August 2, 2015 : Discusses the importance of end-to-end network-layer encryption (HTTPS) as well as secure encryption for data at rest, then introduces the specific cryptography tools that developers should use for specific use cases, whether they use\u00a0<a href=\"https:\/\/pecl.php.net\/package\/libsodium\">libsodium<\/a>,\u00a0<a href=\"https:\/\/github.com\/defuse\/php-encryption\">Defuse Security&#8217;s secure PHP encryption library<\/a>, or OpenSSL.<\/p>\n<p>&nbsp;<\/p>\n<p><a href=\"https:\/\/paragonie.com\/blog\/2017\/12\/2018-guide-building-secure-php-software\">The 2018 Guide to Building Secure PHP Software<\/a>\u00a0(2017) &#8211; Released: December 12, 2017 : This guide should serve as a complement to the e-book,\u00a0<a href=\"http:\/\/www.phptherightway.com\/\">PHP: The Right Way<\/a>, with a strong emphasis on security and not general PHP programmer topics (e.g. code style).[\/vc_column_text][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/leanpub.com\/securingphp-coreconcepts\"><span lang=\"en-AE\">Securing PHP: Core Concepts<\/span><\/a><span lang=\"en-AE\"> &#8211; <\/span><span lang=\"en-AE\" style=\"font-style: italic;\">Securing PHP: Core Concepts<\/span><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">acts as a guide to some of the most common security terms and provides some examples of them in every day PHP.<\/span><\/p>\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/paragonie.com\/book\/pecl-libsodium\"><span lang=\"en-AE\">Using Libsodium in PHP Projects<\/span><\/a><span lang=\"en-US\"> &#8211; <\/span><span lang=\"en-AE\">You shouldn&#8217;t need a Ph.D in Applied Cryptography to build a secure web application. Enter libsodium, which allows developers to develop fast, secure, and reliable applications without needing to know what a stream cipher even is.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Useful libraries<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"https:\/\/github.com\/defuse\/php-encryption\">defuse\/php-encryption<\/a> &#8211; Symmetric-key encryption library for PHP applications. (Recommended\u00a0over rolling your own!)<\/p>\n<p><a href=\"https:\/\/github.com\/ircmaxell\/password_compat\">ircmaxell\/password_compat<\/a> &#8211;\u00a0 If you&#8217;re using PHP 5.3.7+ or 5.4, use this to hash passwords<\/p>\n<p><a href=\"https:\/\/github.com\/ircmaxell\/RandomLib\">ircmaxell\/RandomLib<\/a> &#8211; Useful for generating random strings or numbers<\/p>\n<p><a href=\"https:\/\/github.com\/thephpleague\/oauth2-server\">thephpleague\/oauth2-server<\/a> &#8211; A secure OAuth2 server implementation<\/p>\n<p><a href=\"https:\/\/github.com\/paragonie\/random_compat\">paragonie\/random_compat<\/a> &#8211; PHP 7 offers a new set of CSPRNG functions:\u00a0random_bytes()\u00a0and\u00a0random_int(). This is a community effort to expose the same API in PHP 5 projects (forward compatibility layer). Permissively MIT licensed.<\/p>\n<p><a href=\"https:\/\/github.com\/psecio\/gatekeeper\">psecio\/gatekeeper<\/a> &#8211; A secure authentication and authorization library that implements Role-Based Access Controls and Paragon Initiative Enterprises&#8217; recommendaitons for\u00a0<a href=\"https:\/\/paragonie.com\/blog\/2015\/04\/secure-authentication-php-with-long-term-persistence#title.2\">secure &#8220;remember me&#8221; checkboxes<\/a>.<\/p>\n<p><a href=\"http:\/\/www.openwall.com\/phpass\/\">openwall\/phpass<\/a> &#8211; A portable public domain password hashing framework for use in PHP applications.[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Websites<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"http:\/\/websec.io\/\"><span lang=\"en-AE\">websec.io<\/span><\/a><\/p>\n<p style=\"margin-top: 0pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><span lang=\"en-AE\">websec.io<\/span><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">is dedicated to educating developers about security with topics relating to general security fundamentals, emerging technologies and PHP-specific information<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Perl<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/www.securecoding.cert.org\/confluence\/display\/perl\/SEI+CERT+Perl+Coding+Standard\"><span lang=\"en-AE\">SEI CERT Perl Coding Standard<\/span><\/a><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">(2011) &#8211; Released: January 10, 2011 : A community-maintained Wiki detailing secure coding standards for Perl programming.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Python<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/docs.fedoraproject.org\/en-US\/Fedora_Security_Team\/1\/html\/Defensive_Coding\/chap-Defensive_Coding-Python.html\"><span lang=\"en-AE\">Python chapter of Fedora Defensive Coding Guide<\/span><\/a><span lang=\"en-US\"> &#8211; <\/span><span lang=\"en-AE\">Lists standard library features that should be avoided, and references sections of other chapters that are Python-specific.<\/span><\/p>\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/www.nostarch.com\/blackhatpython\">Black Hat Python: Python Programming for Hackers and Pentesters<\/a> &#8211; Black Hat Python by Justin Seitz from NoStarch Press is a great book for the offensive security minds<\/p>\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"http:\/\/www.amazon.com\/Violent-Python-Cookbook-Penetration-Engineers\/dp\/1597499579\">Violent Python<\/a> &#8211; Violent Python shows you how to move from a theoretical understanding of offensive computing concepts to a practical implementation.<\/p>\n[\/vc_column_text][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Websites<\/h4>\n[\/vc_column_text][vc_column_text]\n<p style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\"><a href=\"https:\/\/github.com\/ebranca\/owasp-pysec\/wiki\"><span lang=\"en-AE\">OWASP Python Security Wiki<\/span><\/a><span lang=\"en-US\">\u00a0<\/span><span lang=\"en-AE\">(2014) &#8211; Released: June 21, 2014 : A wiki maintained by the OWASP Python Security project.<\/span><\/p>\n[\/vc_column_text][\/vc_column][\/vc_row][vc_row type=&#8221;in_container&#8221; full_screen_row_position=&#8221;middle&#8221; column_margin=&#8221;default&#8221; column_direction=&#8221;default&#8221; column_direction_tablet=&#8221;default&#8221; column_direction_phone=&#8221;default&#8221; scene_position=&#8221;center&#8221; text_color=&#8221;dark&#8221; text_align=&#8221;left&#8221; row_border_radius=&#8221;none&#8221; row_border_radius_applies=&#8221;bg&#8221; overflow=&#8221;visible&#8221; overlay_strength=&#8221;0.3&#8243; gradient_direction=&#8221;left_to_right&#8221; shape_divider_position=&#8221;bottom&#8221; bg_image_animation=&#8221;none&#8221;][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][heading]\n<h3 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 11.0pt; color: black;\">Ruby<\/h3>\n[\/heading][\/vc_column][vc_column column_padding=&#8221;no-extra-padding&#8221; column_padding_tablet=&#8221;inherit&#8221; column_padding_phone=&#8221;inherit&#8221; column_padding_position=&#8221;all&#8221; column_element_direction_desktop=&#8221;default&#8221; column_element_spacing=&#8221;default&#8221; desktop_text_alignment=&#8221;default&#8221; tablet_text_alignment=&#8221;default&#8221; phone_text_alignment=&#8221;default&#8221; background_color_opacity=&#8221;1&#8243; background_hover_color_opacity=&#8221;1&#8243; column_backdrop_filter=&#8221;none&#8221; column_shadow=&#8221;none&#8221; column_border_radius=&#8221;none&#8221; column_link_target=&#8221;_self&#8221; column_position=&#8221;default&#8221; gradient_direction=&#8221;left_to_right&#8221; overlay_strength=&#8221;0.3&#8243; width=&#8221;1\/1&#8243; tablet_width_inherit=&#8221;default&#8221; animation_type=&#8221;default&#8221; bg_image_animation=&#8221;none&#8221; border_type=&#8221;simple&#8221; column_border_width=&#8221;none&#8221; column_border_style=&#8221;solid&#8221;][vc_column_text]\n<h4 style=\"margin-top: 18pt; margin-bottom: 12pt; font-family: Calibri; font-size: 14.0pt; color: black;\">Books and ebooks<\/h4>\n[\/vc_column_text][vc_column_text]<a href=\"https:\/\/docs.fedoraproject.org\/en-US\/Fedora_Security_Team\/1\/html\/Secure_Ruby_Development_Guide\/index.html\">Secure Ruby Development Guide<\/a>\u00a0(2014) &#8211; Released: March 10, 2014 :\u00a0 A guide to secure Ruby development by the Fedora Security Team. Also available on\u00a0<a href=\"https:\/\/github.com\/jrusnack\/secure-ruby-development-guide\">Github<\/a>.[\/vc_column_text][\/vc_column][\/vc_row]\n","protected":false},"excerpt":{"rendered":"<p>Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla<\/p>\n","protected":false},"author":1,"featured_media":6204,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[3,4],"tags":[40],"class_list":{"0":"post-6186","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-application-security","8":"category-cyber-security","9":"tag-application-security"},"yoast_head":"<!-- This site is optimized with the Yoast SEO plugin v27.3 - https:\/\/yoast.com\/product\/yoast-seo-wordpress\/ -->\n<title>Application Security Learning Resources - Sajin Shivdas | Cybersecurity<\/title>\n<meta name=\"description\" content=\"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla\" \/>\n<meta name=\"robots\" content=\"index, follow, max-snippet:-1, max-image-preview:large, max-video-preview:-1\" \/>\n<link rel=\"canonical\" href=\"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/\" \/>\n<meta property=\"og:locale\" content=\"en_US\" \/>\n<meta property=\"og:type\" content=\"article\" \/>\n<meta property=\"og:title\" content=\"Application Security Learning Resources - Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"og:description\" content=\"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla\" \/>\n<meta property=\"og:url\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/\" \/>\n<meta property=\"og:site_name\" content=\"Sajin Shivdas | Cybersecurity\" \/>\n<meta property=\"article:published_time\" content=\"2022-11-17T20:21:10+00:00\" \/>\n<meta property=\"article:modified_time\" content=\"2023-03-27T08:32:51+00:00\" \/>\n<meta property=\"og:image\" content=\"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/businessman-using-tech-devices-icons-thin-line-interface.jpg\" \/>\n\t<meta property=\"og:image:width\" content=\"1000\" \/>\n\t<meta property=\"og:image:height\" content=\"609\" \/>\n\t<meta property=\"og:image:type\" content=\"image\/jpeg\" \/>\n<meta name=\"author\" content=\"Sajin Shivdas\" \/>\n<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t<meta name=\"twitter:data1\" content=\"Sajin Shivdas\" \/>\n\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t<meta name=\"twitter:data2\" content=\"45 minutes\" \/>\n<script type=\"application\/ld+json\" class=\"yoast-schema-graph\">{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":[\"Article\",\"BlogPosting\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#article\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/\"},\"author\":{\"name\":\"Sajin Shivdas\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"headline\":\"Application Security Learning Resources\",\"datePublished\":\"2022-11-17T20:21:10+00:00\",\"dateModified\":\"2023-03-27T08:32:51+00:00\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/\"},\"wordCount\":8997,\"commentCount\":0,\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/businessman-using-tech-devices-icons-thin-line-interface.jpg\",\"keywords\":[\"application Security\"],\"articleSection\":[\"Application Security\",\"Cyber Security\"],\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"CommentAction\",\"name\":\"Comment\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#respond\"]}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/\",\"name\":\"Application Security Learning Resources - Sajin Shivdas | Cybersecurity\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#primaryimage\"},\"image\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#primaryimage\"},\"thumbnailUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/businessman-using-tech-devices-icons-thin-line-interface.jpg\",\"datePublished\":\"2022-11-17T20:21:10+00:00\",\"dateModified\":\"2023-03-27T08:32:51+00:00\",\"description\":\"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla\",\"breadcrumb\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#breadcrumb\"},\"inLanguage\":\"en-US\",\"potentialAction\":[{\"@type\":\"ReadAction\",\"target\":[\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/\"]}]},{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#primaryimage\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/businessman-using-tech-devices-icons-thin-line-interface.jpg\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2022\\\/11\\\/businessman-using-tech-devices-icons-thin-line-interface.jpg\",\"width\":1000,\"height\":609},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/application-security-learning-resources\\\/#breadcrumb\",\"itemListElement\":[{\"@type\":\"ListItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\"},{\"@type\":\"ListItem\",\"position\":2,\"name\":\"Application Security Learning Resources\"}]},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#website\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/\",\"name\":\"sajinshivdas.com\",\"description\":\"Cybersecurity - Information security Resources, Articles and Latest News\",\"publisher\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\"},\"alternateName\":\"Sajin Shivdas\",\"potentialAction\":[{\"@type\":\"SearchAction\",\"target\":{\"@type\":\"EntryPoint\",\"urlTemplate\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/?s={search_term_string}\"},\"query-input\":{\"@type\":\"PropertyValueSpecification\",\"valueRequired\":true,\"valueName\":\"search_term_string\"}}],\"inLanguage\":\"en-US\"},{\"@type\":[\"Person\",\"Organization\"],\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/#\\\/schema\\\/person\\\/af1d121cbedd3ce64369f21a359ff2e6\",\"name\":\"Sajin Shivdas\",\"image\":{\"@type\":\"ImageObject\",\"inLanguage\":\"en-US\",\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"url\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"contentUrl\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\",\"width\":1000,\"height\":500,\"caption\":\"Sajin Shivdas\"},\"logo\":{\"@id\":\"https:\\\/\\\/sajinshivdas.com\\\/cybersecurity\\\/wp-content\\\/uploads\\\/2023\\\/01\\\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png\"},\"sameAs\":[\"http:\\\/\\\/sajinshivdas.com\\\/security\",\"www.linkedin.com\\\/in\\\/sajin-shivdas\"]}]}<\/script>\n<!-- \/ Yoast SEO plugin. -->","yoast_head_json":{"title":"Application Security Learning Resources - Sajin Shivdas | Cybersecurity","description":"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla","robots":{"index":"index","follow":"follow","max-snippet":"max-snippet:-1","max-image-preview":"max-image-preview:large","max-video-preview":"max-video-preview:-1"},"canonical":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/","og_locale":"en_US","og_type":"article","og_title":"Application Security Learning Resources - Sajin Shivdas | Cybersecurity","og_description":"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla","og_url":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/","og_site_name":"Sajin Shivdas | Cybersecurity","article_published_time":"2022-11-17T20:21:10+00:00","article_modified_time":"2023-03-27T08:32:51+00:00","og_image":[{"width":1000,"height":609,"url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/businessman-using-tech-devices-icons-thin-line-interface.jpg","type":"image\/jpeg"}],"author":"Sajin Shivdas","twitter_misc":{"Written by":"Sajin Shivdas","Est. reading time":"45 minutes"},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":["Article","BlogPosting"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#article","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/"},"author":{"name":"Sajin Shivdas","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"headline":"Application Security Learning Resources","datePublished":"2022-11-17T20:21:10+00:00","dateModified":"2023-03-27T08:32:51+00:00","mainEntityOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/"},"wordCount":8997,"commentCount":0,"publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/businessman-using-tech-devices-icons-thin-line-interface.jpg","keywords":["application Security"],"articleSection":["Application Security","Cyber Security"],"inLanguage":"en-US","potentialAction":[{"@type":"CommentAction","name":"Comment","target":["https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#respond"]}]},{"@type":"WebPage","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/","url":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/","name":"Application Security Learning Resources - Sajin Shivdas | Cybersecurity","isPartOf":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website"},"primaryImageOfPage":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#primaryimage"},"image":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#primaryimage"},"thumbnailUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/businessman-using-tech-devices-icons-thin-line-interface.jpg","datePublished":"2022-11-17T20:21:10+00:00","dateModified":"2023-03-27T08:32:51+00:00","description":"Sed condimentum massa in enim cursus, sed mattis elit malesuada. Lorem sapien acveh icula vestibulum, arcu magna aliquet velit. Nunc elementum mattis diam eu aliquam. Phasellus augue nulla, venenatis non hendrerit ac, volutpat sit amet sem. Donec eleifend nulla","breadcrumb":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#breadcrumb"},"inLanguage":"en-US","potentialAction":[{"@type":"ReadAction","target":["https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/"]}]},{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#primaryimage","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/businessman-using-tech-devices-icons-thin-line-interface.jpg","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2022\/11\/businessman-using-tech-devices-icons-thin-line-interface.jpg","width":1000,"height":609},{"@type":"BreadcrumbList","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/application-security-learning-resources\/#breadcrumb","itemListElement":[{"@type":"ListItem","position":1,"name":"Home","item":"https:\/\/sajinshivdas.com\/cybersecurity\/"},{"@type":"ListItem","position":2,"name":"Application Security Learning Resources"}]},{"@type":"WebSite","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#website","url":"https:\/\/sajinshivdas.com\/cybersecurity\/","name":"sajinshivdas.com","description":"Cybersecurity - Information security Resources, Articles and Latest News","publisher":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6"},"alternateName":"Sajin Shivdas","potentialAction":[{"@type":"SearchAction","target":{"@type":"EntryPoint","urlTemplate":"https:\/\/sajinshivdas.com\/cybersecurity\/?s={search_term_string}"},"query-input":{"@type":"PropertyValueSpecification","valueRequired":true,"valueName":"search_term_string"}}],"inLanguage":"en-US"},{"@type":["Person","Organization"],"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/#\/schema\/person\/af1d121cbedd3ce64369f21a359ff2e6","name":"Sajin Shivdas","image":{"@type":"ImageObject","inLanguage":"en-US","@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","url":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","contentUrl":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png","width":1000,"height":500,"caption":"Sajin Shivdas"},"logo":{"@id":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-content\/uploads\/2023\/01\/5dbd4f42-9550-4c99-82e9-34f3c99a2253.png"},"sameAs":["http:\/\/sajinshivdas.com\/security","www.linkedin.com\/in\/sajin-shivdas"]}]}},"_links":{"self":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6186","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/comments?post=6186"}],"version-history":[{"count":0,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/posts\/6186\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media\/6204"}],"wp:attachment":[{"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/media?parent=6186"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/categories?post=6186"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/sajinshivdas.com\/cybersecurity\/wp-json\/wp\/v2\/tags?post=6186"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}