Forgery

Results: 1137



#Item
421Computing / Cross-site request forgery / OWASP / Cross-site scripting / Web application security / Vulnerability / Application security / Aggregate / WebScarab / Cyberwarfare / Computer security / Computer network security

OWASP Top[removed]Dave Wichers OWASP Top 10 Project Lead OWASP Board Member COO/Cofounder, Aspect Security

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-03 09:41:55
422Computing / Security / OWASP / Software testing / Web application security / Application security / Application firewall / Cross-site request forgery / Vulnerability / Computer security / Cyberwarfare / Computer network security

OWASP AppSec Resarch 2013 Conference http://www.owasp.org/index.php/AppSecEU2013 WASC/OWASP WAFEC From industry to community project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-08-26 18:02:53
423JavaScript / Web development / OWASP / XMLHttpRequest / Cross-site request forgery / JSON / Document Object Model / Web application / Cross-site scripting / Computing / World Wide Web / Ajax

Development Issues within AJAX Applications: How to Divert Threats OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:11
424Computing / OWASP / Web application security / Application security / Vulnerability / Cross-site request forgery / SQL injection / ModSecurity / Threat / Computer security / Computer network security / Cyberwarfare

The Web Hacking Incidents Database (WHID) Report: January – June 2009 AppSec DC

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:50
425Computer network security / OWASP / Application security / Cross-site request forgery / Cross-site scripting / Threat model / SQL injection / CCWAPSS / Penetration test / Cyberwarfare / Computer security / Security

Developing Secure Applications with OWASP Martin Knobloch [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:28
426Computer network security / OWASP / Cross-site request forgery / Penetration test / BeanShell / DEVS / Plug-in / Computing / Computer security / Security

German OWASP Day 2012 The OWASP Foundation http://www.owasp.org

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-09 12:36:41
427HTML / Form / World Wide Web / PHP / Checkbox / Cross-site request forgery / Ext JS / HTML element / GUI widget / Software / Computing / PHP programming language

Working with Zend\Form Rob Allen PHPNW 12, October 2012 The problem with forms They break the concept of separation of concerns:

Add to Reading List

Source URL: akrabat.com

Language: English - Date: 2013-12-19 04:29:54
428SQL injection / Computing / Data / Information / Security / OWASP / Cross-site request forgery

Agile and Secure Can we do both? OWASP Jerry Hoff

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:25
429Business / Counterfeit consumer goods / Intellectual property law / Counterfeit / Forgery / BASCAP / International trade / Organized crime / Piracy / Law / Crime / International nongovernmental organizations

THE ECONOMIC IMPACT OF COUNTERFEITING AND PIRACY Executive Summary ORGANISATION FOR ECONOMIC CO-OPERATION AND DEVELOPMENT

Add to Reading List

Source URL: oecd.org

Language: English - Date: 2014-07-21 01:24:26
430Computer security / HTTP / HTTP cookie / Internet privacy / Clickjacking / Cookiejacking / Cross-site request forgery / Hacking / Computing / Social engineering

Cookiejacking Rosario Valotta Agenda !   Me, myself and I !   The IE security zones

Add to Reading List

Source URL: media.hacking-lab.com

Language: English - Date: 2011-06-08 04:51:58
UPDATE