White Papers

Secure Mobile Application Development Reference by Dan Cornell

How-to-Guide for Software Security Vulnerability Remediation by Dan Cornell

Exploiting AutoRun by Kevin M. Williams, CISSP

Properties of Secure Hash Functions by Erhan Kartaltepe

Cryptographic Methodologies: A Primer on Tactics for Securing Information by Kevin M. Williams, CISSP

An Introduction to Aspect-Oriented Programming and AspectJ by Erhan Kartaltepe

ASP .NET 2.0 Security Enhancements (PDF) by Kristin McGregor

 

Articles

The Magic of Symbiotic Security Creating an Ecosystem of Security Systems ThreadFix (Includes Educational Video) By Dan Cornell, Concise Courses, July 2013

Top Strategies to Capture Security Intelligence for Applications (Includes Educational Video) By John Dickson, Concise Courses, July 2013

A guide to platform specific security for the mobile developer By Dan Cornell, TechTarget, April 2013

Code signing: Why it matters for mobile developers By Dan Cornell, TechTarget, April 2013

Software developers: Dealing with untrusted Wi-Fi connections By Dan Cornell, TechTarget, April 2013

Can universities give young developers application security training? By Dan Cornell, TechTarget, March 2013

What's ailing enterprise software security management? By Dan Cornell, TechTarget, March 2013

Mobile Security's Missing Link By Dan Cornell, Information Week

What You Don't Know Can Hurt You: Security Professionals and Applications (PDF Format) by John B. Dickson, ISSA Journal, November 2009

The Importance of Partnerships by John Dickson

An Introduction to ASP .NET 2.0 Security by Dan Cornell

The Right Tool for the Right Job by Dan Cornell

Which SharePoint is Right for You? by Dan Cornell

Why Should Small to Medium Sized Businesses Care about Portals? by Sheridan Chambers

Considering Outside Help for a Project? Here are Several Questions You Should Ask. by John Dickson

6 Critical Questions to Ask Vendors to Ensure IT Project Success by John Dickson

Four Security Concerns Enterprises Developing Mobile Applications Must Address by Dan Cornell, IDG Connect, February 2011

8 security questions to ask before building mobile applications by John Dickson, CSO Online, April 2011