Cross-site scripting

Results: 700



#Item
421JavaScript / OWASP / Ajax / HTML / JSON / Cross-site scripting / Computing / Markup languages / Cross-platform software

Future of XSS Defense Jim Manico VP of Security Architecture [removed]

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
422Computer network security / Security / Software testing / OWASP / Cross-site scripting / Cross-site request forgery / Web application security / SQL injection / Vulnerability / Computer security / Cyberwarfare / Computing

OWASP Top 10 – 2010 The Top 10 Most Critical Web Application Security Risks Dave Wichers COO, Aspect Security OWASP Board Member

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:56
423Computer security / Computer network security / Crime prevention / National security / Software testing / Application security / Vulnerability / Cross-site scripting / Information security / Cyberwarfare / Security / Computing

International Financial Institution Uses Cenzic Hailstorm Enterprise ARC to Meet Critical Security Control for Application Software Security Challenge Solution

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-02-21 16:34:39
424Computer network security / Cross-site scripting / Aggregate / OWASP / Vulnerability / Motorways of Switzerland / Web application security / ISO 216 / Cross-site request forgery / Computer security / Cyberwarfare / Software testing

Transforming IT Security & Compliance A Decade of Web Application Security What have we learned? Jason Kent, Director Web Application Security

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
425Content Security Policy / Data URI scheme / Markup languages / Cross-site scripting / JavaScript / Google Chrome / HTML / Framing / World Wide Web / Computing / Software / Computer security

Building a Content Security Policy (CSP) Eric Johnson SANS App Sec[removed]Copyright © 2014 − Cypress Data Defense, LLC

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2014-02-12 17:26:20
426Web 2.0 / Cross-platform software / Internet privacy / Gears / Gmail / JavaScript / Backdoor / Cross-site scripting / Google Chrome / Software / Computing / World Wide Web

PDF Document

Add to Reading List

Source URL: www.andlabs.org

Language: English - Date: 2010-03-02 05:56:28
427Computer network security / Software testing / Cross-site scripting / Vulnerability / SQL injection / Application security / Remote file inclusion / Web application security / Web application security scanner / Computer security / Cyberwarfare / Failure

Using a Web Server Test Bed to Analyze the Limitations of Web Application Vulnerability Scanners David A. Shelly Thesis submitted to the Faculty of the

Add to Reading List

Source URL: scholar.lib.vt.edu

Language: English - Date: 2010-08-10 18:47:47
428Computer network security / Cross-site scripting / Software testing / Cross-site request forgery / Hacking / OWASP / JavaScript / Application security / Vulnerability / Computer security / Cyberwarfare / Computing

Application Security for Rich Internet Applications @johnwilander at Jfokus Feb[removed]Stockholm, Sweden

Add to Reading List

Source URL: www.jfokus.se

Language: English - Date: 2012-09-20 14:56:56
429Software testing / Computer network security / Hacking / BackTrack / KDE / Metasploit Project / Exploit / Cross-site scripting / Password / Computer security / Cyberwarfare / Software

P a g e |1 BackTrack 5 Guide II: Exploitation tools and frameworks Karthik R, Contributor You can read the original story here, on SearchSecurity.in.

Add to Reading List

Source URL: media.techtarget.com

Language: English - Date: 2012-02-07 06:48:35
430Computer network security / Software testing / Secure communication / National security / Web application security / Password / Penetration test / Cross-site scripting / HTTP Secure / Computer security / Security / Cyberwarfare

Securing Web Application Technologies (SWAT) C h e c k l i s t The SWAT Checklist provides an easy-to-reference set of best practices that raise awareness and help development teams create more secure applications. It’

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-28 15:58:14
UPDATE