David Checa´s Blog

Special Weapons And Tactics For Net Developers

Primary Menu

  • About Me
Search

Category: ASP.NET MVC

ASP.NET MVC

Embracing Microservices : Centralizing Access

overview In this article, we will expose the importance of centralizing access…

Continue reading “Embracing Microservices : Centralizing Access”…
Posted on: 23 May 2023 Written by: David Checa

Embracing Microservices : Data Consistency

Overview At this new microservices article we will discuss the concept of…

Continue reading “Embracing Microservices : Data Consistency”…
Posted on: 18 May 2023 Written by: David Checa

Embracing Microservices : Api-based approach

Overview In this new microservice article, we’ll delve into architecting API-based microservices.…

Continue reading “Embracing Microservices : Api-based approach”…
Posted on: 13 May 2023 Written by: David Checa

OWASP TOP 4: Xml External Entities (XEE)

This is the fifth article in the OWASP Top 10 Series Overview…

Continue reading “OWASP TOP 4: Xml External Entities (XEE)”…
Posted on: 29 Jun 2019 Written by: David Checa

OWASP TOP 3: Sensitive Data Exposure Basics

This is the fourth article in the OWASP Top 10 Series Overview…

Continue reading “OWASP TOP 3: Sensitive Data Exposure Basics”…
Posted on: 21 Jun 2019 Written by: David Checa

OWASP TOP 2: Broken Authentication and Session Management Basics

This is the third article in the OWASP Top 10 Series Overview…

Continue reading “OWASP TOP 2: Broken Authentication and Session Management Basics”…
Posted on: 14 Jun 2019 Written by: David Checa

Footer sidebar

Tags

.NET ThreadPool Angular AppDomains Application Security Architecture Asynchronous Programming AWS Azure Broekn Authentication CLR CLR-Threading CodeDOM Command Injection DLR DSL Dynamic C# Garbage Collector GCP HTST LDAP Injection Metaprogramming Microfrontends Microservices mono.cecil OWASP TOP 10 OWASP Top Ten React Reflection Reflection Injection Roslyn Sensitive Data Exposure Session Hijacking Session Management SQL Injection SSL Strong Hashing Syntax Nodes Syntax Trees T4 TLS Trivial Node Uncategorised WCF Weak Encryption XPath Injection
© 2025 David Checa´s Blog | Using Auberge WordPress theme. | Back to top ↑