Cross-site scripting

Results: 700



#Item
281Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
282Computer network security / Software testing / Hacking / Cross-site scripting / Vulnerability / Electronic commerce / Web application security scanner / Application security / Application firewall / Computer security / Cyberwarfare / Computing

Application Vulnerability Trends Report : 2013 Application Vulnerability Trends Report 2013

Add to Reading List

Source URL: expo-itsecurity.ru

Language: English - Date: 2013-03-07 02:16:44
283Web development / Ajax / Cross-platform software / Document Object Model / Cross-browser / Web application / Cross-site scripting / Unobtrusive JavaScript / Remote Scripting / Computing / Software / JavaScript

Microsoft Word - CCN02CEJSRFPR1101 _CourseOutline.doc

Add to Reading List

Source URL: www.ciwcertified.com

Language: English - Date: 2012-03-06 09:22:26
284Web development / Ajax / Cross-platform software / Document Object Model / Cross-browser / Web application / Cross-site scripting / Unobtrusive JavaScript / Remote Scripting / Computing / Software / JavaScript

Microsoft Word - CCN02CEJSRFPR1101 _CourseOutline.doc

Add to Reading List

Source URL: www.ciwcareeracademy.com

Language: English - Date: 2014-06-11 17:35:43
285Software testing / Computing / Hacking / Penetration test / Application security / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Computer network security / Cyberwarfare

SWAT PRODUCT BROCHURE WEB APPLICATION SECURITY Web application security has been a huge challenge for companies during the last couple of years since there are very few competent solutions available in the market. The

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2014-12-15 07:24:52
286HTTP / Computer network security / URI schemes / Uniform resource locator / Ajax / Cross-site request forgery / HTTP cookie / Cross-site scripting / DNS rebinding / Computing / Software / Internet

Towards a Formal Foundation of Web Security Devdatta Akhawe∗ , Adam Barth∗ , Peifung E. Lam† , John Mitchell† and Dawn Song∗ ∗ University of California, Berkeley {devdatta,abarth,dawnsong}@cs.berkeley.edu †

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2010-05-17 14:26:50
287Security / Software testing / Hacking / Electronic commerce / Vulnerability / Penetration test / Areva / Cross-site scripting / Social vulnerability / Computer security / Cyberwarfare / Computer network security

Vulnerability Assessment and Penetration Testing AREVA’s Vulnerability Assessments identify and quantify vulnerabilities, and provide recommendations to eliminate or mitigate the risk. Our Penetration Testing uses adva

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-03-17 14:26:26
288Computer network security / Computing / Application security / Application firewall / Penetration test / Web application security / Vulnerability / Cross-site scripting / SQL injection / Computer security / Cyberwarfare / Software testing

Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:13:21
289Cross-platform software / Software testing / Cross-site scripting / JavaScript / HTTP cookie / Vulnerability / Form / Java / Application firewall / Computing / Computer security / Cyberwarfare

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
290Vulnerability / Software assurance / Application security / Penetration test / Fuzz testing / National Institute of Standards and Technology / Cross-site scripting / Web application security scanner / SAINT / Computer security / Software testing / Cyberwarfare

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19
UPDATE