LEARNING FOR LIFE

Get Yourself a Better Life! Free eLearning Download

  • Technical
    • Internet & Networking
    • Security & Hacking
    • AI | Artificial intelligence
    • OS & Server
    • WEB/HTML/CSS/AJAX
    • Database & SQL
    • Programming
    • Perl & PHP
    • .Net & Java
    • Mobile Development
    • C/C++/C#
    • Game Development
    • Unix & Linux
    • MAC OS X
    • Windows
    • OFFICE
    • Operation Systems
    • Hardware
  • Graphic & Media
    • Photography
    • 3D
    • Adobe Product Training
    • Art & Drawing & Painting
    • Film & Film Making
    • Game Designing
    • Music Training
    • Tutorials for designer
  • Business
    • Business & Investing
    • Writing & Affiliate
    • Marketing
    • Sales
    • Economics & Finances
    • Seo & Site Traffic
    • Stock & ForEX
  • Life Stype
    • Self Improvement | MP
    • Mindset | NLP
    • Fashion / Clothing / Grooming
    • Seduction
    • Fighting / Martial Arts
    • Food / Drink / Cooking
    • Health / Fitness / Massage
    • Languages / Accents
    • Magic / Illusions / Tricks
    • Psychology / Body Language
  • Engineering & Science
    • Cultures & History
    • Electrical & Architecture
    • Mathematics & Physics
    • Medical
  • Entertainment
    • Comic
    • Manga
    • Novel
    • Magazine
  • PC Game
    • Mac Game
    • Xbox Game
    • Play Station Game
Home » Ebooks & Tutorials » Technical » Programming » LiveLessons – Secure Coding Rules for Java

LiveLessons – Secure Coding Rules for Java

22/06/2015 Learning for Life Leave a Comment

LiveLessons – Secure Coding Rules for Java
English | Size: 2.90 GB (3,110,806,076 Bytes)
Category: CBTs


In this video training, Robert provides complementary coverage to the rules in The CERT Oracle Secure Coding Standard for Java, demonstrating common Java programming errors and their consequences using Java 8 and Eclipse. Robert describes language behaviors left to the discretion of JVM and compiler implementers and guides developers in the proper use of Java’s APIs including lang, util, Collections, Concurrency Utilities, Logging, Management, Reflection, Regular Expressions, Zip, I/O, JMX, JNI, Math, Serialization, and JAXP.

Java Professional Development LiveLessons provides developers with practical guidance for developing Java programs that are robust and secure. These LiveLessons complement The CERT Oracle Secure Coding Standard for Java

Introduction

Lesson 1: Java Security Concepts 1.1 Injection attacks 1.2 Leaking sensitive data 1.3 Denial-of-service attacks

Lesson 2: Input Validation and Data Sanitization (IDS) IDS00-J. Prevent SQL Injection IDS01-J. Normalize strings before validating them IDS03-J. Do not log unsanitized user input IDS04-J. Safely extract files from ZipInputStream IDS06-J. Exclude unsanitized user input from format strings IDS07-J. Do not pass untrusted, unsanitized data to the Runtime.exec() method IDS08-J. Sanitize untrusted data passed to a regex IDS11-J. Perform any string modifications before validation IDS16-J. Prevent XML Injection IDS17-J. Prevent XML External Entity Attacks

Lesson 3: Declarations and Initialization (DCL): DCL00-J. Prevent class initialization cycles

Lesson 4: Expressions (EXP) EXP00-J. Do not ignore values returned by methods EXP01-J. Never dereference null pointers EXP02-J. Do not use the Object.equals() method to compare two arrays EXP03-J. Do not use the equality operators when comparing values of boxed primitives EXP04-J. Do not pass arguments to certain Java Collections Framework methods that are a different type than the collection parameter type EXP06-J. Expressions used in assertions must not produce side effects

Lesson 5: Numeric Types and Operations (NUM) NUM00-J. Detect or prevent integer overflow NUM01-J. Do not perform bitwise and arithmetic operations on the same data NUM02-J. Ensure that division and modulo operations do not result in divide-by-zero errors NUM03-J. Use integer types that can fully represent the possible range of unsigned data NUM04-J. Do not use floating-point numbers if precise computation is required NUM05-J. Do not use denormalized numbers NUM07-J. Do not attempt comparisons with NaN NUM08-J. Check floating-point inputs for exceptional values NUM09-J. Do not use floating-point variables as loop counters NUM10-J. Do not construct BigDecimal objects from floating-point literals NUM11-J. Do not compare or inspect the string representation of floating-point values NUM12-J. Ensure conversions of numeric types to narrower types do not result in lost or misinterpreted data NUM13-J. Avoid loss of precision when converting primitive integers to floating-point

Lesson 6: Characters and Strings (STR) STR00-J. Use an int to capture the return value of methods that read a character or byte STR01-J. Don’t form strings containing partial characters STR02-J. Specify an appropriate locale when comparing locale-dependent data STR03-J. Do not convert between strings and bytes without specifying a valid character encoding STR04-J. Use compatible character encodings on both sides of file or network I/O

Buy Long-term Premium Accounts To Support Me & Max Speed

DOWNLOAD:


http://uploaded.net/file/gn42tuwd/Secure%20Coding%20Rules%20for%20Java.part1.rar
http://uploaded.net/file/zo1hwxok/Secure%20Coding%20Rules%20for%20Java.part2.rar
http://uploaded.net/file/qvb0j2dc/Secure%20Coding%20Rules%20for%20Java.part3.rar
http://uploaded.net/file/w6jk6zwy/Secure%20Coding%20Rules%20for%20Java.part4.rar
http://uploaded.net/file/zm4dqrjm/Secure%20Coding%20Rules%20for%20Java.part5.rar
http://uploaded.net/file/pbwiir0q/Secure%20Coding%20Rules%20for%20Java.part6.rar
http://uploaded.net/file/nsxfqw7o/Secure%20Coding%20Rules%20for%20Java.part7.rar


http://rapidgator.net/file/84eb7461ed92d57dcf65b2bc8e62b7f1/Secure_Coding_Rules_for_Java.part1.rar.html
http://rapidgator.net/file/506e1b8992413efca42a2ea86cb722db/Secure_Coding_Rules_for_Java.part2.rar.html
http://rapidgator.net/file/49e9e25e4477c20b3e87fed7bfef7fec/Secure_Coding_Rules_for_Java.part3.rar.html
http://rapidgator.net/file/7981e1f66947c4d4b1d12c97e6a70f80/Secure_Coding_Rules_for_Java.part4.rar.html
http://rapidgator.net/file/828f00ecb0a1af488dc31e71829b3d47/Secure_Coding_Rules_for_Java.part5.rar.html
http://rapidgator.net/file/ebd7d42cf416d4df6e7fcfb6437e305b/Secure_Coding_Rules_for_Java.part6.rar.html
http://rapidgator.net/file/6f4aa28fb73ad4a27ab7b5d2fccfce1b/Secure_Coding_Rules_for_Java.part7.rar.html

If any links die or problem unrar, send request to http://goo.gl/aUHSZc

Programming Coding Rules, Java, LiveLessons, Secure

← Julien Blanc – SHIFT The Story Series + Bonus Infield Breakdown Price action Chris Kapre →

About Learning for Life

Leave a Reply Cancel reply

Your email address will not be published. Required fields are marked *

This site uses Akismet to reduce spam. Learn how your comment data is processed.

  • Udemy – 100 Hours Web Development Bootcamp – Build 23 React Projects 2025
  • Udemy – CompTIA Network+ N10-009 – 2025
  • Evil Genius – Mind Performance Projects for the Evil Genius – 19 Brain-Bending Bio Hacks – Brad Graham, Kathy McGowan
  • Udemy – CCNP Enterprise ENARSI 300-410 v1.1 – Mustafa Bin Amar (2025.04)
  • Udemy – Java Programming Bootcamp Zero to Mastery

Meta

  • Log in
  • Entries feed
  • Comments feed
  • WordPress.org

2019 2020 2021 2022 2023 2024 Advanced AWS Azure BBC Beginners BitBook BOOKWARE Certified Cisco Cloud Comic Complete Course Data Design eBook Fundamentals Guide Hybrid iLEARN Introduction JavaScript Learn Learning LinkedIn Linux Lynda Masterclass Microsoft Packt Pluralsight Programming Python Security Skillshare Training Udemy Using XQZT

Copyright © 2025 · Equilibre on Genesis Framework · WordPress · Log in