際際滷shows by User: sunilanv / http://www.slideshare.net/images/logo.gif 際際滷shows by User: sunilanv / Sat, 25 Jul 2015 10:30:18 GMT 際際滷Share feed for 際際滷shows by User: sunilanv Null meet Code Review /slideshow/null-meet-codereviewslideshare-5/50915755 nullmeetcodereviewslideshare5-150725103018-lva1-app6892
This presentation gives the brief overview of the procedure that needs to be followed for performing manual code review while assessing the security of an application/service. There are two parts for this presentation. This first part covers some vulnerabilities and the second part covers remaining vulnerabilities.]]>

This presentation gives the brief overview of the procedure that needs to be followed for performing manual code review while assessing the security of an application/service. There are two parts for this presentation. This first part covers some vulnerabilities and the second part covers remaining vulnerabilities.]]>
Sat, 25 Jul 2015 10:30:18 GMT /slideshow/null-meet-codereviewslideshare-5/50915755 sunilanv@slideshare.net(sunilanv) Null meet Code Review sunilanv This presentation gives the brief overview of the procedure that needs to be followed for performing manual code review while assessing the security of an application/service. There are two parts for this presentation. This first part covers some vulnerabilities and the second part covers remaining vulnerabilities. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullmeetcodereviewslideshare5-150725103018-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation gives the brief overview of the procedure that needs to be followed for performing manual code review while assessing the security of an application/service. There are two parts for this presentation. This first part covers some vulnerabilities and the second part covers remaining vulnerabilities.
Null meet Code Review from Naga Venkata Sunil Alamuri
]]>
3908 13 https://cdn.slidesharecdn.com/ss_thumbnails/nullmeetcodereviewslideshare5-150725103018-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Null bachav /slideshow/null-bhachav/48214976 nullbhachav-150516055936-lva1-app6892
This presentation discusses the importance of threat Modeling. This presentation also discusses about different ways to perform threat modeling. This threat modeling should be done during the design phase of the application development. The main aim of the threat modeling is to identify the import assets or functionalities of the application and to protect them. Threat Modeling cuts down the cost of application development as it identifies the issues during the design phase. In this presentation we also discuss about basics of Mobile Threat Modeling. This presentation mainly concentrates on STRIDE and DREAD.]]>

This presentation discusses the importance of threat Modeling. This presentation also discusses about different ways to perform threat modeling. This threat modeling should be done during the design phase of the application development. The main aim of the threat modeling is to identify the import assets or functionalities of the application and to protect them. Threat Modeling cuts down the cost of application development as it identifies the issues during the design phase. In this presentation we also discuss about basics of Mobile Threat Modeling. This presentation mainly concentrates on STRIDE and DREAD.]]>
Sat, 16 May 2015 05:59:36 GMT /slideshow/null-bhachav/48214976 sunilanv@slideshare.net(sunilanv) Null bachav sunilanv This presentation discusses the importance of threat Modeling. This presentation also discusses about different ways to perform threat modeling. This threat modeling should be done during the design phase of the application development. The main aim of the threat modeling is to identify the import assets or functionalities of the application and to protect them. Threat Modeling cuts down the cost of application development as it identifies the issues during the design phase. In this presentation we also discuss about basics of Mobile Threat Modeling. This presentation mainly concentrates on STRIDE and DREAD. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nullbhachav-150516055936-lva1-app6892-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> This presentation discusses the importance of threat Modeling. This presentation also discusses about different ways to perform threat modeling. This threat modeling should be done during the design phase of the application development. The main aim of the threat modeling is to identify the import assets or functionalities of the application and to protect them. Threat Modeling cuts down the cost of application development as it identifies the issues during the design phase. In this presentation we also discuss about basics of Mobile Threat Modeling. This presentation mainly concentrates on STRIDE and DREAD.
Null bachav from Naga Venkata Sunil Alamuri
]]>
3165 8 https://cdn.slidesharecdn.com/ss_thumbnails/nullbhachav-150516055936-lva1-app6892-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png Sunil is working as Software Engineer at Amazon. He has around 3 years of experience in Application Security and Information Security. He is one of the core committee member in NULL Hyderabad chapter. His job includes conducting Threat Modeling, Manual code reviews, Source Code Analysis using Fortify, Consultancy, Vulnerability Remediation, Penetration Testing (Web and Mobile Applications) and delivering Secure Coding Trainings. He has delivered Secure coding in JAVA and Application Security Awareness training to more than 250+ developers. He played a sole role in maintaining the Fortify application. He has developed Mobile Penetration Testing procedure document for Android and iOS. He ... https://cdn.slidesharecdn.com/ss_thumbnails/nullmeetcodereviewslideshare5-150725103018-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/null-meet-codereviewslideshare-5/50915755 Null meet Code Review https://cdn.slidesharecdn.com/ss_thumbnails/nullbhachav-150516055936-lva1-app6892-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/null-bhachav/48214976 Null bachav