Cross-site request forgery

Results: 270



#Item
1Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson  Stanford University

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2012-03-30 06:50:04
2Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Research Report: Mitigating LangSec Problems With Capabilities Nathaniel Wesley Filardo Johns Hopkins University Baltimore, MD

Add to Reading List

Source URL: spw16.langsec.org

Language: English - Date: 2016-06-05 23:38:35
3#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
4Laboratory for Computer Security Education  1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

Laboratory for Computer Security Education 1 Cross-Site Scripting (XSS) Attack Lab cWenliang Du, Syracuse University.

Add to Reading List

Source URL: www.cis.syr.edu

Language: English - Date: 2010-11-01 16:33:26
5PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

PREVOTY APPLICATION SECURITY MONITOR AND PROTECT YOUR APPLICATIONS AT RUNTIME For hackers, the money is in applications and the databases they access. For enterprises, the distributed, dynamic nature of applications and

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
6VoidSec Advisory 2016

VoidSec Advisory 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-13 11:30:11
7oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36
8OWASP Cheat Sheets Martin Woschek,  April 9, 2015 Contents I

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
9Microsoft PowerPoint - DenimGroup_OWASPTop10_A5_CrossSiteRequestForwarding_OWASPAustin_20070731.ppt [Compatibility Mode]

Microsoft PowerPoint - DenimGroup_OWASPTop10_A5_CrossSiteRequestForwarding_OWASPAustin_20070731.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:01
10#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

#1 GLOBAL PAYMENTS COMPANY OPTIMIZES SECURE DEVELOPMENT PROCESS WITH PREVOTY Trusted payments provider with deeply embedded secure development culture partners with Prevoty for standardized, real-time application protect

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2016-08-18 22:09:36