Forgery

Results: 1137



#Item
51Hacking / Computer security / Computer network security / Cryptography / National security / Cross-site request forgery / Oscar / SQL injection / Cross-site scripting / Application security / Vulnerability

oscar Oscar’s radical approach to healthcare requires unparalleled application security CASE STUDY: ENTERPRISE APPLICATION

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2016-08-18 22:09:36
52MySQL / Cross-platform software / Hacking / Hypertext Transfer Protocol / MariaDB / PhpMyAdmin / Cross-site request forgery / Cross-site scripting / Session fixation / HTTP cookie / Session hijacking / JavaScript

phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

Add to Reading List

Source URL: wiki.mozilla.org

Language: English - Date: 2016-06-06 10:06:22
53Library science / Anti-German sentiment / Christine / Political forgery / Public library

CVW Long Lake Public Library BOARD MINUTES Tuesday, November 11, :00 pm APPROVED

Add to Reading List

Source URL: longlake.sals.edu

Language: English - Date: 2016-03-23 16:17:33
54Hypertext Transfer Protocol / Cross-site request forgery / Internet privacy / JavaScript / Ajax / Computer network security / Same-origin policy / Cross-site scripting / HTTP cookie / Referer spoofing / Session fixation / XMLHttpRequest

Robust Defenses for Cross-Site Request Forgery Adam Barth Collin Jackson Stanford University

Add to Reading List

Source URL: seclab.stanford.edu

Language: English - Date: 2008-10-31 13:52:34
55Computer security / Cross-platform software / Scripting languages / Computing platforms / Java platform / HDIV / JavaScript / Vulnerability / Cross-site request forgery / Java / Adobe ColdFusion / Application security

Enterprise Security API (ESAPI) Java Java User Group – San Antonio Jarret Raim June 3rd, 2010

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:19:01
56Computer security / Computing / Cyberwarfare / Hacking / Computer network security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
57Computer access control / Access control / Authentication / Notary / Packaging / Biometrics

Forgery-Resistant Touch-based Authentication on Mobile Devices Neil Zhenqiang Gong, Mathias Payer*, Reza Moazzezi, Mario Frank,

Add to Reading List

Source URL: hexhive.github.io

Language: English - Date: 2016-06-13 11:08:40
58Crime / Criminal law / Law / Counterfeit / Forgery / Brand piracy / Copyright infringement / Piracy

 – BEGUILING APPEARANCE – MURKY SHADOWS?

Add to Reading List

Source URL: www.afd.admin.ch

Language: English - Date: 2016-04-25 10:58:26
59Cryptography / Criminology / Forensic science / Heuristics / Online and offline / Computer security / Art forgery

Call for Participation Signature Verification Competition On- and Offline Skilled Forgeries http://sigcomp09.arsforensica.org 10th International Conference on Document Analysis and Recognition

Add to Reading List

Source URL: www.cvc.uab.es

Language: English - Date: 2009-01-20 10:13:08
60Computer access control / Computer security / Computing / World Wide Web / Human-based computation / Hacking / Social engineering / Spamming / CAPTCHA / Internet bot / Cross-site request forgery / Transaction authentication number

Tell Me About Yourself: The Malicious CAPTCHA Attack Nethanel Gelernter Amir Herzberg Dept. of Computer Science

Add to Reading List

Source URL: www2016.net

Language: English - Date: 2016-04-10 09:10:41
UPDATE