Secure Programming: Android Intermediate

https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53345&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53346&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53347&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53349&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53350&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53351&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53352&expertiselevel=53348 https://www.skillsoft.com/channel/secure-programming-8d130630-e1a0-11e6-91a7-0242c0a80704?technologyandversion=53353&expertiselevel=53348
  • 4 Courses | 2h 42m 33s
  • 6 Books | 71h 31m
  • 8 Courses | 6h 11m 13s
  • 6 Books | 30h 57m
  • 9 Courses | 7h 55m 48s
  • 6 Books | 31h 1m
  • 4 Courses | 2h 57m 2s
  • 7 Books | 58h 23m
  • 4 Courses | 3h 35m 21s
  • 7 Books | 58h 5m
  • 4 Courses | 2h 42m 33s
  • 6 Books | 35h 38m
  • 2 Courses | 1h 42m 12s
  • 5 Books | 38h 20m
  • 5 Courses | 7h 16m 37s
  • 8 Books | 61h 4m
Likes 104
 
Secure programming is a development methodology for ensuring the security of the applications you create. Explore its various aspects here.

GETTING STARTED

Defensive Coding Fundamentals for JavaScript and HTML5

  • Playable
    1. 
    Potential Software Risks in JavaScript and HTML5
    3m 45s
    NOW PLAYING
  • Playable
    2. 
    Why Do Risks Exist in JavaScript and HTML5?
    2m 54s
    UP NEXT

GETTING STARTED

Defensive Programming Input

  • Playable
    1. 
    Making Assumptions about User Input
    4m 1s
    NOW PLAYING
  • Playable
    2. 
    Receiving File Input Data
    4m 1s
    UP NEXT

GETTING STARTED

Thinking Defensively about Input, Constants, & Conditionals