Click here to Skip to main content

Web Security

Great Reads

by Brij
This article discusses some problems with the earlier approach and discusses Identity federation
by Dennis Baberich
A simple check list on what to look out for when developing a website
by Steve Wellens
There was a question from a student over on the Asp.Net forums about improving site performance. The concern was that every time an app setting was read from the Web.Config file, the disk would be accessed. With many app settings and many users, it was believed performance would suffer. Their intent
by Sarvesh Kushwaha
This article describes how to obfuscate the javascript in and mvc.

Latest Articles

by Taiseer Joudeh
Part 3: Tutorial shows how to implement OAuth JSON Web Tokens Authentication (JWT) using ASP.NET Web API 2.2 and ASP.NET Identity 2.1
by CdnSecurityEngineer
What view should a security individual working in the security space have? What’s their role? Should they know software development, or only security? Should they do testing, or should they only provide direction, what level of direction should they provide?…Read more ›The post Sec
by madan535
In this post we will learn how to encrypt connection string in web.config
by Gjermund Bjaanes
I want to learn Web Development. And i want to share my journey from beginner to wherever I am going to go with this (hopefully an expert with time). That is the premise for this series of blog posts. I... Continue Reading →

Research Library

Up to 80% of the source code in many new commercial and enterprise...
The web application firewall (WAF) market has grown strongly in recent...
While there’s no doubt that open source software is here to stay, that...
The focus of IT security is increasingly moving away from the network...


by Member 11484150 on Article "Authenticate user by roles in"
by Tomz_KV on Article "Cross Domain/Platform Authentication...
by Susheel Kumar Verma on Article "Cross Domain/Platform Authentication...
by John Atten on technical blog "Implement OAuth JSON Web...
by Humayun Kabir Mamun on article "Implementing Two Factor...

All Articles