Cross-site scripting

Results: 700



#Item
511HTTP / World Wide Web / Social engineering / Cross-site scripting / Google Chrome / Password / Framing / HTTP Secure / Phishing / Software / Computing / Human–computer interaction

AD_TOIT_halfpage_4C_P091.indd

Add to Reading List

Source URL: theory.stanford.edu

Language: English - Date: 2010-03-09 17:34:23
512Computer network security / Crime prevention / National security / OWASP / Web application security / Application security / Vulnerability / Cross-site scripting / Information security / Computer security / Cyberwarfare / Security

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
513Computer network security / Security / Software testing / Trust seal / Vulnerability / Cross-site scripting / Malware / SQL injection / SecurityMetrics / Cyberwarfare / Computer security / Electronic commerce

Product Description SiteLock helps protect more than just your website; it can protect your business. There have never been more threats to your website business than now. Hackers use malware, SQL Injection, Crosssite sc

Add to Reading List

Source URL: www.sixu.com

Language: English - Date: 2011-10-29 15:26:13
514Computing / Application security / Denial-of-service attack / Vulnerability / Malware / Cross-site scripting / Attack / Application firewall / Intrusion prevention system / Cyberwarfare / Computer network security / Computer security

Attack Mitigation Solution Technology Overview - Whitepaper AMS Technology Overview Whitepaper Table of Contents

Add to Reading List

Source URL: www.brinkster.com

Language: English - Date: 2012-09-28 17:49:19
515Cross-platform software / Scripting languages / Procedural programming languages / Relational database management systems / Database management systems / Assertion / Password / Vulnerability / Cross-site scripting / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-08-11 16:30:41
516Computer network security / Crime prevention / National security / OWASP / Web application security / Application security / Vulnerability / Cross-site scripting / Information security / Computer security / Cyberwarfare / Security

[removed][removed][removed]New York State Information Technology Standard No: NYS-S13-002

Add to Reading List

Source URL: its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
517Scripting languages / Software testing / Ajax / JavaScript / Cross-platform software / Cross-site scripting / JSON / Cross-site request forgery / Code injection / Computing / Computer security / Cyberwarfare

FLAX: Systematic Discovery of Client-side Validation Vulnerabilities in Rich Web Applications Prateek Saxena§ Steve Hanna§ Pongsin Poosankam‡§ Dawn Song§

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2010-03-22 11:25:35
518Computing / Software testing / Hacking / Electronic commerce / Cross-site scripting / Application security / Vulnerability / Exploit / Web application security / Computer security / Cyberwarfare / Computer network security

… White paper Web Application Security: GamaSec Solution 1. Web Applications: An attractive target How do you cost effectively defend web applications from attack? Your organization relies on

Add to Reading List

Source URL: www.alentus.com

Language: English - Date: 2011-04-06 12:15:34
519Software testing / Failure / Vulnerability / Attack patterns / Common Vulnerabilities and Exposures / CWE / Common Weakness Enumeration / Cross-site scripting / Application security / Cyberwarfare / Computer security / Hacking

Studying Software Vulnerabilities Dr. Robin A. Gandhi, Dr. Harvey Siy, and Yan Wu The University of Nebraska at Omaha M

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-10-29 15:34:06
520Portable software / Firefox / Web browsers / Software testing / Cross-site scripting / Internet Explorer / Google Chrome / Adobe Flash Player / Vulnerability / Software / News aggregators / FTP clients

Vulnerability Statistics for[removed]POSITIVE RESEARCH Table of contents 1

Add to Reading List

Source URL: www.ptsecurity.com

Language: English - Date: 2013-10-15 07:19:17
UPDATE