Learn about some techniques that IoT device developers should consider implementing to help protect their devices against threats such as Mirai.


Learn about some techniques that IoT device developers should consider implementing to help protect their devices against threats such as Mirai.
Become proficient with security aspects before a web application goes live over the Internet.
Less than half of all developers implement any type of security development procedure when designing their applications, a recent Microsoft study revealed.
Discover how to deal with C4996 warning, what secure CRT functions are and how to correctly use them.
See how you can tighten security gaps using JavaScript and practices such as the Same Origin Policy, Data Tainting, and Signed Scripts.
Windows Vista introduces a new security concept called User Access Control (UAC), where local administrators have two access tokens—one representing the privileges of a normal user and the other holding the elevated privileges of the local administrator account. Here, you will learn how to properly implement the UAC to provide a rich user experience.

Learn more about a few commonly used components and explore their utility and usages.

Become proficient with using type definitions in C#.

Learn about the various forms of encryption in Visual Basic and the differences among them.
Application Programming Interfaces (APIs) are where you have to be. It's not a matter of if as much as a matter of which.