Cross-site scripting

Results: 700



#Item
501HTTP Strict Transport Security / HTTP cookie / Firesheep / JavaScript / Cross-site scripting / HTTP Secure / Content Security Policy / World Wide Web / Firefox / Software / HTTP / Computing

Microsoft Word - Protecting web applications.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-09-27 02:43:59
502Software testing / Computer network security / Hacking / Electronic commerce / Secure communication / Cross-site scripting / Vulnerability / Application security / Form / Cyberwarfare / Computer security / Computing

South Dakota Application Security Vulnerabilities The purpose of this document is to list existing and emerging threats that pose significant risk to State hosted applications and the critical information that is generat

Add to Reading List

Source URL: cybersecurity.sd.gov

Language: English - Date: 2014-07-01 15:38:36
503Cyberwarfare / Password / Cross-site scripting / Web application security / HTTP Secure / HTTP cookie / Login / Cross-site request forgery / HTTP Strict Transport Security / HTTP / Computing / Computer security

Securing Web Application Technologies (SWAT) CH E CKL I S T The SWAT Checklist provides an easy to reference set of best practices that raise awareness and help development teams create more secure applications. It’s a

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-02-12 10:08:44
504Club Test 02 / Redbird

Document Structure Integrity: A Robust Basis for Cross-site Scripting Defense Yacin Nadji∗ Illinois Institute of Technology Chicago, IL, USA [removed]

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2009-02-24 04:40:16
505Cross-platform software / Scripting languages / Relational database management systems / Database management systems / Software testing / Vulnerability / Cross-site scripting / SQL injection / Code injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2014-09-23 03:33:32
506Computer network security / Software testing / Secure communication / Security / Cross-site scripting / OWASP / Penetration test / Web application security / Application security / Computer security / Cyberwarfare / Computing

OWASP Top Ten Most Critical Web Application Security Vulnerabilities – 2004 Update

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:28
507URI schemes / Internet standards / Human–computer interaction / FTP clients / Cross-site scripting / Google Chrome / HTTP cookie / Internet Explorer / Data URI scheme / Computing / Software / HTTP

Secure Content Sniffing for Web Browsers, or How to Stop Papers from Reviewing Themselves Adam Barth UC Berkeley Juan Caballero

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
508Computer network security / Crime prevention / National security / Software testing / Vulnerability / Cross-site scripting / Information security / Password / Malware / Computer security / Cyberwarfare / Security

U.S. DEPARTMENT OF COMMERCE Office of Inspector General Office of the Secretary Improvements Are Needed for Effective Web Security

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-03-07 17:15:02
509Cybercrime / Cross-site request forgery / Computer crimes / Cross-site scripting / HTTP cookie / Phishing / JavaScript / Internet privacy / Google Chrome / Software / Computing / HTTP

All Your Screens are Belong to Us: Attacks Exploiting the HTML5 Screen Sharing API Yuan Tian∗ , Ying-Chuan Liu‡ , Amar Bhosale† , Lin-Shung Huang∗ ,Patrick Tague† ,Collin Jackson∗ ∗ {yuan.tian, Carnegie Me

Add to Reading List

Source URL: wnss.sv.cmu.edu

Language: English - Date: 2014-05-21 14:14:22
510Computer network security / Software testing / Hacking / Vulnerability / Electronic commerce / Application security / Software assurance / Cross-site scripting / Social vulnerability / Cyberwarfare / Computer security / Security

© Route66 | Dreamstime.com Insecure IT O

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2009-04-24 01:00:00
UPDATE