• 00 Intro
    • 01 Microcontrollers
    • 02 Data Platforms
    • 03 Protocols
    • 05 Gateway
    • 06 Messaging
    • 07 LoRaWAN
    • 08 Dashboards
    • 09 Exam
    • Intro
    • 01 Data Protection
    • 02 Exploits
    • 03 Redundancy
    • 04 Privilege Separation
    • 05 Cryptography
    • 06 Testing
    • 07 HTTP Protocol
    • 08 Web Attacks
    • 09 Defense Mechanisms
    • 10 Authentication
    • 11 Dependencies
    • 13 Cases
    • 00 Intro
    • 01 Types
    • 02 Lists
    • 03 Functions
    • 04 Recursion
    • 05 Datatypes
    • 00 Intro
    • 01 Pointers
    • 02 Arrays
    • 03 Classes
    • 04 Performance
    • 05 Operators
    • 06 Exam
    • 08 Templates
    • 09 Streams
    • 10 Standard Library
    • 11 Functional Programming
    • 00 Intro
    • 01 Servlets
    • 02 Spring
    • 03 Model-View-Controller
    • 04 Validation
    • 05 Single Page Applications
    • 06 Components
    • 07 Side Effects
    • 08 Rest
    • 09 Fetch
    • 10 Express
    • 11 Redux
    • 00 Intro
    • 01 Networking
    • 02 Data Streams
    • 03 HTTP
  • cloud CLOUD
    • 00 Intro
    • 01 Supervised Learning
    • 03 Linear Regression
    • 04 Logistic Regression
    • 05 Neural Network
    • 06 Development Process
    • 07 Performance Metrics
    • 08 Decision Trees
    • 09 Clustering
    • 10 Recommender Systems
    • 11 Reinforcment Learning
    • 02 Data Lifecycle Management
    • 03 Business Continuity Planning
    • 05 Configuration and Asset Management
    • 06 Performance and Availability Management
    • 00 Intro
    • 01 HTML
  • article IP5
    • 00 Intro
    • 02 JPA Basics
    • 03 JPA Associations
    • 04 JPA Inheritance
    • 05 JPA Queries
    • 06 JPA Repositories
    • 07 Data Transfer Objects
    • 08 Architecture
    • 09 Aspect-oriented Programming
    • 00 Intro
    • 00 Intro
    • 00 Intro
    • 01 Services
    • 02 Pricing
    • 03 Compute
    • 04 Storage
    • 05 Databases
    • 08 Kubernetes
    • GitHub
  • to navigate
  • to select
  • to close
    • Home
    • APSI
    On this page
    article

    APSI

    article

    Intro

    Software engineering needs to apply more security principle to strengthen security of applications

    security

    01 Data Protection

    Data protection and privacy

    destruction

    02 Exploits

    Buffer overflows, error handling and algorithmic complexity exploits

    smb_share

    03 Redundancy

    How to use redundancy to secure applications and software

    safety_divider

    04 Privilege Separation

    Reduce attack surface by dividing code into multiple modules which each run with minimal privileges

    encrypted

    05 Cryptography

    labs

    06 Testing

    Security testing for software

    http

    07 HTTP Protocol

    Basics of the HTTP protocol

    travel_explore

    08 Web Attacks

    Attacks on web applications and web servers

    security

    09 Defense Mechanisms

    Technologies used to protect against attacks

    lock_open

    10 Authentication

    Authentication frameworks

    link

    11 Dependencies

    Dependencies and supply chain attacks

    article

    13 Cases

    Real world cases


    © 2025 Janick Lehmann. Built with Hugo, Lotus Docs and GitHub