
## \#NeverForget
# 64 bit -> 16 bit
## 9,223,372,036,854,775,807 -> 65,536
## Se suele hacer:
* TDD
* Pruebas de usuario
* Pentesting

[Microsoft](https://www.microsoft.com/en-us/sdl/about/benefits.aspx)

[NIST](https://nvd.nist.gov/general/visualizations/vulnerability-visualizations/cvss-severity-distribution-over-time)
## Dise帽o:
* [An谩lisis de modelo de amenazas](https://www.owasp.org/index.php/Application_Threat_Modeling)
* [Programaci贸n formal](https://lamport.azurewebsites.net/tla/tla.html)
## Programaci贸n:
* [Principios de codificaci贸n segura](https://www.owasp.org/index.php/Category:OWASP_Top_Ten_Project)
* [An谩lisis de c贸digo](https://www.sonarqube.org/)
* Errores
* Olores
* Vulnerabilidades
## Pruebas:
* [Revisi贸n de c贸digo](https://www.owasp.org/index.php/Category:OWASP_Code_Review_Project)
* [Fuzzing](https://www.owasp.org/index.php/OWASP_Zed_Attack_Proxy_Project)
### Jes煤s Mar铆n
Email: [contacto@jesusmg.org](mailto://contacto@jesusmg.org)
Blog: [http://jesusmg.org](http://jesusmg.org)
Twitter: [@_jesusmg](http://twitter.com/_jesusmg)