{"id":69027,"date":"2021-08-10T04:10:06","date_gmt":"2021-08-10T08:10:06","guid":{"rendered":"http:\/\/bangla.salearningschool.com\/recent-posts\/software-security-resources-54\/"},"modified":"2021-08-10T04:10:06","modified_gmt":"2021-08-10T08:10:06","slug":"software-security-resources-54","status":"publish","type":"post","link":"http:\/\/bangla.sitestree.com\/?p=69027","title":{"rendered":"Software Security Resources #54"},"content":{"rendered":"<ul>\n<li> <a href='http:\/\/www.cigital.com\/papers\/download\/bsi1-swsec.pdf'>Software  Security Theory<\/a>  <\/li>\n<li> <a href='http:\/\/java.sun.com\/javase\/technologies\/security\/' target='new' rel=\"noopener\">Security Support in Java<\/a>  <\/li>\n<li> <a href='http:\/\/www.knowdotnet.com\/articles\/securityattributes.html' target='new' rel=\"noopener\">Security in .Net<\/a> <\/li>\n<li> <a href='http:\/\/www.onjava.com\/pub\/a\/onjava\/2003\/11\/26\/javavsdotnet.html' target='new' rel=\"noopener\">Java vs .Net Security<\/a><\/li>\n<li> <a href='http:\/\/www.onjava.com\/pub\/a\/onjava\/2003\/12\/10\/javavsdotnet.html' target='new' rel=\"noopener\">Java vs .Net Security &#8211; 2 <\/a><\/li>\n<li> <a href='http:\/\/www.cgisecurity.com\/development\/dot-net.shtml' target='new' rel=\"noopener\">Security Resources<\/a><\/li>\n<\/ul>\n<p>From: http:\/\/sitestree.com\/?p=4874<br \/> Categories:54<br \/>Tags:<br \/> Post Data:2006-10-30 03:47:52<\/p>\n<pre><code>    Shop Online: &lt;a href='https:\/\/www.ShopForSoul.com\/' target='new' rel=\"noopener\"&gt;https:\/\/www.ShopForSoul.com\/&lt;\/a&gt;\n    (Big Data, Cloud, Security, Machine Learning): Courses: &lt;a href='http:\/\/Training.SitesTree.com' target='new' rel=\"noopener\"&gt; http:\/\/Training.SitesTree.com&lt;\/a&gt; \n    In Bengali: &lt;a href='http:\/\/Bangla.SaLearningSchool.com' target='new' rel=\"noopener\"&gt;http:\/\/Bangla.SaLearningSchool.com&lt;\/a&gt;\n    &lt;a href='http:\/\/SitesTree.com' target='new' rel=\"noopener\"&gt;http:\/\/SitesTree.com&lt;\/a&gt;\n    8112223 Canada Inc.\/JustEtc: &lt;a href='http:\/\/JustEtc.net' target='new' rel=\"noopener\"&gt;http:\/\/JustEtc.net (Software\/Web\/Mobile\/Big-Data\/Machine Learning) &lt;\/a&gt;\n    Shop Online: &lt;a href='https:\/\/www.ShopForSoul.com'&gt; https:\/\/www.ShopForSoul.com\/&lt;\/a&gt;\n    Medium: &lt;a href='https:\/\/medium.com\/@SayedAhmedCanada' target='new' rel=\"noopener\"&gt; https:\/\/medium.com\/@SayedAhmedCanada &lt;\/a&gt;\n<\/code><\/pre>\n","protected":false},"excerpt":{"rendered":"<p>Software Security Theory Security Support in Java Security in .Net Java vs .Net Security Java vs .Net Security &#8211; 2 Security Resources From: http:\/\/sitestree.com\/?p=4874 Categories:54Tags: Post Data:2006-10-30 03:47:52 Shop Online: &lt;a href=&#8217;https:\/\/www.ShopForSoul.com\/&#8217; target=&#8217;new&#8217; rel=&#8221;noopener&#8221;&gt;https:\/\/www.ShopForSoul.com\/&lt;\/a&gt; (Big Data, Cloud, Security, Machine Learning): Courses: &lt;a href=&#8217;http:\/\/Training.SitesTree.com&#8217; target=&#8217;new&#8217; rel=&#8221;noopener&#8221;&gt; http:\/\/Training.SitesTree.com&lt;\/a&gt; In Bengali: &lt;a href=&#8217;http:\/\/Bangla.SaLearningSchool.com&#8217; target=&#8217;new&#8217; rel=&#8221;noopener&#8221;&gt;http:\/\/Bangla.SaLearningSchool.com&lt;\/a&gt; &lt;a href=&#8217;http:\/\/SitesTree.com&#8217; target=&#8217;new&#8217; &hellip; <\/p>\n<p><a class=\"more-link btn\" href=\"http:\/\/bangla.sitestree.com\/?p=69027\">Continue reading<\/a><\/p>\n","protected":false},"author":8,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_jetpack_memberships_contains_paid_content":false,"footnotes":""},"categories":[1917],"tags":[],"class_list":["post-69027","post","type-post","status-publish","format-standard","hentry","category-fromsitestree-com","item-wrap"],"jetpack_featured_media_url":"","jetpack_sharing_enabled":true,"jetpack-related-posts":[{"id":66419,"url":"http:\/\/bangla.sitestree.com\/?p=66419","url_meta":{"origin":69027,"position":0},"title":"Struts 2 vs. Struts 1 #Java Short Notes","author":"Sayed","date":"July 19, 2021","format":false,"excerpt":"Please check the following resources: Struts 2: Configuration Elements Struts 1 vs Struts 2 Migrating from Struts 1 to Struts 2 Comparing Struts 1 and 2 From: http:\/\/sitestree.com\/?p=4987 Categories:Java Short NotesTags: Post Data:2008-11-22 05:09:37 Shop Online: https:\/\/www.ShopForSoul.com\/ (Big Data, Cloud, Security, Machine Learning): Courses: http:\/\/Training.SitesTree.com In Bengali: http:\/\/Bangla.SaLearningSchool.com http:\/\/SitesTree.com 8112223\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":66334,"url":"http:\/\/bangla.sitestree.com\/?p=66334","url_meta":{"origin":69027,"position":1},"title":"Java 2 Security Architecture #Java Short Notes","author":"Author-Check- Article-or-Video","date":"July 18, 2021","format":false,"excerpt":"Security Services Provide Data Integrity Data Confidentiality Access Control - Authentication and Authorization Encryption helps to provide such security services Core Java Security Architecture -- Core Java 2 Security Architecture -- Java Cryptography Architecture (JCA) -- Java Cryptography Extension (JCE) -- Java Secure Socket Extension (JSSE) -- Java Authentication and\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":70219,"url":"http:\/\/bangla.sitestree.com\/?p=70219","url_meta":{"origin":69027,"position":2},"title":"Date Time Calendar Functions in .Net, PHP, and Java Worlds #104","author":"Author-Check- Article-or-Video","date":"August 29, 2021","format":false,"excerpt":"Date and time related operations are very common in software and web-applications development. Hence, better learn them well. Keep your resources (code samples, function lists) for reuse in future. I am just listing some date, time, and calendar related resources in different platforms. To be good at multiple platforms at\u2026","rel":"","context":"In &quot;C# - Misc&quot;","block_context":{"text":"C# - Misc","link":"http:\/\/bangla.sitestree.com\/?cat=1973"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":67795,"url":"http:\/\/bangla.sitestree.com\/?p=67795","url_meta":{"origin":69027,"position":3},"title":"Resources Checked Recently or Stumbled Upon #By Sayed Ahmed #Misc. Reading","author":"Author-Check- Article-or-Video","date":"July 28, 2021","format":false,"excerpt":"Resources Checked Recently or Stumbled Upon On NoSQL http:\/\/searchdatamanagement.techtarget.com\/feature\/Key-criteria-for-choosing-different-types-of-NoSQL-databases http:\/\/blog.flux7.com\/blogs\/nosql\/nosql-database-solutions-types-and-examples http:\/\/www.eweek.com\/database\/slideshows\/nosql-database-deployments-10-real-world-examples http:\/\/programmers.stackexchange.com\/questions\/158790\/best-practices-for-nosql-database-design On Data Visualization\/Chart Display Technologies https:\/\/www.sitepoint.com\/15-best-javascript-charting-libraries\/ http:\/\/c3js.org\/ http:\/\/www.telerik.com\/blogs\/get-rolling-with-kendo-ui-and-php-ndash-part-1 https:\/\/www.sitepoint.com\/4-best-chart-generation-options-php-components\/ Which platform is the best for Career (.Net, PHP, Java) : https:\/\/www.linkedin.com\/pulse\/20141114182637-12880086-php-vs-asp-net-what-you-should-really-be-comparing-instead https:\/\/www.quora.com\/Which-job-has-more-pay-Java-PHP-or-net https:\/\/www.quora.com\/Which-job-has-more-pay-Java-PHP-or-net https:\/\/www.quora.com\/Which-is-better-as-a-developer-career-NET-or-PHP Misc -Job\/Career http:\/\/www.forbes.com\/sites\/lizryan\/2016\/09\/11\/ten-reasons-never-to-be-the-perfect-employee\/#36b480a94f46 https:\/\/msdn.microsoft.com\/en-us\/library\/ms819938.aspx http:\/\/www.careerplaybook.com\/guide\/research_employers.asp On Health http:\/\/www.kidney-treatment.org\/micro-chinese-medicine-osmotherapy.html Code-igNiter and Laravel http:\/\/career.guru99.com\/top-14-codeigniter-interview-questions\/ http:\/\/www.programmerdesk.com\/blog\/detail\/33\/codeigniter-interview-questions-and-answers http:\/\/phpsollutions.blogspot.ca\/2014\/07\/codeigniter-interview-question-and.html\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":67490,"url":"http:\/\/bangla.sitestree.com\/?p=67490","url_meta":{"origin":69027,"position":4},"title":"Key Generation: Security : Basic Java #Java","author":"Author-Check- Article-or-Video","date":"July 23, 2021","format":false,"excerpt":"Key Generation : Basic Java keytool -genkey -alias signFiles -keystore examplestore jarsigner -keystore examplestore -signedjar sCount.jar Count.jar signFiles keytool -export -keystore examplestore -alias signFiles -file Example.cer --- Application under Security Manager java -Djava.security.manager -cp sCount.jar Count C:TestDatadata --- Misc keytool -import -alias susan -file Example.cer -keystore exampleraystore keytool -printcert -file\u2026","rel":"","context":"In &quot;FromSitesTree.com&quot;","block_context":{"text":"FromSitesTree.com","link":"http:\/\/bangla.sitestree.com\/?cat=1917"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]},{"id":21644,"url":"http:\/\/bangla.sitestree.com\/?p=21644","url_meta":{"origin":69027,"position":5},"title":"Some C# Stuff #Web Development #By Sayed Ahmed","author":"Author-Check- Article-or-Video","date":"March 3, 2021","format":false,"excerpt":"Object-Oriented Programming (C# and Visual Basic) http:\/\/msdn.microsoft.com\/en-CA\/library\/dd460654.aspx \u00a0 LINQ (Language-Integrated Query) http:\/\/msdn.microsoft.com\/en-ca\/library\/bb397926.aspx 101 LINQ Sample Application http:\/\/code.msdn.microsoft.com\/101-LINQ-Samples-3fb9811b \u00a0 Parallel LINQ (PLINQ) http:\/\/msdn.microsoft.com\/en-us\/library\/dd460688%28v=vs.110%29.aspx \u00a0 Entity Framework http:\/\/msdn.microsoft.com\/en-ca\/data\/ef.aspx \u00a0 Working with DBContext http:\/\/msdn.microsoft.com\/en-ca\/data\/jj729737.aspx \u00a0 SOAP vs Rest https:\/\/stackoverflow.com\/questions\/209905\/representational-state-transfer-rest-and-simple-object-access-protocol-soap http:\/\/msdn.microsoft.com\/en-us\/library\/vstudio\/hh323724%28v=vs.100%29.aspx \u00a0 \u00a0 \u00a0 Security in SOAP and REST http:\/\/msdn.microsoft.com\/en-us\/library\/vstudio\/hh323714%28v=vs.100%29.aspx \u00a0 WS-Security https:\/\/en.wikipedia.org\/wiki\/WS-Security \u00a0\u2026","rel":"","context":"In &quot;C# - Misc&quot;","block_context":{"text":"C# - Misc","link":"http:\/\/bangla.sitestree.com\/?cat=1973"},"img":{"alt_text":"","src":"","width":0,"height":0},"classes":[]}],"_links":{"self":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/69027","targetHints":{"allow":["GET"]}}],"collection":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/users\/8"}],"replies":[{"embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=69027"}],"version-history":[{"count":0,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=\/wp\/v2\/posts\/69027\/revisions"}],"wp:attachment":[{"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=69027"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=69027"},{"taxonomy":"post_tag","embeddable":true,"href":"http:\/\/bangla.sitestree.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=69027"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}