Published at LXer:
Now to begin with, let’s first understand how to evaluate the performance of java code and protect the java code from tainted objects. We’ve already talked about
Tainted Object Propagation in my previous post in context with databases. now, it is in context with application code. I’ll explain this with an example of enum pattern.
Read More...