Cross-site scripting

Results: 700



#Item
41C HA PT E R 1 9 The Form Processor OVERVIEW Our form processing application allows a site administrator to process the results of Web-based forms in a number of ways. The script can be used to generate dynamic E-mail or

C HA PT E R 1 9 The Form Processor OVERVIEW Our form processing application allows a site administrator to process the results of Web-based forms in a number of ways. The script can be used to generate dynamic E-mail or

Add to Reading List

Source URL: www.extropia.com

Language: English - Date: 2003-08-09 07:16:23
42oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
43Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Finding Security Vulnerabilities in Java Applications with Static Analysis Benjamin Livshits and Monica S. Lam Computer Science Department

Add to Reading List

Source URL: suif.stanford.edu

Language: English - Date: 2005-09-25 18:44:49
44Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich MIT CSAIL

Intrusion Recovery for Database-backed Web Applications Ramesh Chandra, Taesoo Kim, Meelap Shah, Neha Narula, and Nickolai Zeldovich MIT CSAIL

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2011-09-11 16:39:13
45Protection and Communication Abstractions for Web Browsers in MashupOS Helen J. Wang Xiaofeng Fan

Protection and Communication Abstractions for Web Browsers in MashupOS Helen J. Wang Xiaofeng Fan

Add to Reading List

Source URL: www.sosp2007.org

Language: English - Date: 2016-06-15 13:09:51
46IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING,  VOL. 15, NO. 4,

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 15, NO. 4,

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-19 16:08:00
47phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

Add to Reading List

Source URL: wiki.mozilla.org

Language: English - Date: 2016-06-06 10:06:22
48Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson  Stanford University

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-10-31 13:52:34
49WHITEHAT SENTINEL SOURCE FOR MOBILE  DA T A SHE E T WhiteHat Sentinel Source for Mobile

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
50Enterprise Security API (ESAPI) Java Java User Group – San Antonio Jarret Raim June 3rd, 2010

Enterprise Security API (ESAPI) Java Java User Group – San Antonio Jarret Raim June 3rd, 2010

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:19:01