Foundstone

Results: 35



#Item
1

JMSDigger By Gursev Singh Kalra – Senior Principal (@igursev) McAfee, Foundstone Professional Services BlackHat Las Vegas - July 31, 2013

Add to Reading List

Source URL: media.blackhat.com

- Date: 2013-08-12 10:08:07
    2Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

    Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:16:27
    3Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

    Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:27:01
    4Software architecture / Computing / Cyberwarfare / Computer security / Computer network security / Web applications / Web development / Cross-site scripting / Application server / Web application security / Foundstone / Application security

    Application Security and the SDLC Dan Cornell Denim Group, Ltd. www.denimgroup.com

    Add to Reading List

    Source URL: denimgroup.com

    Language: English - Date: 2014-01-13 18:20:31
    5

    Game Changer: Identifying and Defending Against Data Exfiltration Attempts SANS Cyber Defense Summit 2015 – Nashville, TN Ismael Valenzuela, Lead IR/Forensics Technical Practice Manager (Foundstone Professional Service

    Add to Reading List

    Source URL: files.sans.org

    Language: English - Date: 2015-08-24 11:24:57
      6Antivirus software / Cybercrime / National security / McAfee / Software bugs / Intel Security / Computer security / Cyberwarfare / Heartbleed / Malware / Foundstone / Shellshock

      Report McAfee Labs Threats Report August 2015

      Add to Reading List

      Source URL: www.mcafee.com

      Language: English - Date: 2015-08-28 16:54:27
      7Economy / Information privacy / Business / Money / Payment cards / E-commerce / Payment systems / Antivirus software / Intel Security / Payment card industry / Card security code / Foundstone

      PDF Document

      Add to Reading List

      Source URL: www.nebraskacert.org

      Language: English - Date: 2011-05-21 12:06:58
      8

      Penetration Testing Android Applications Author: Kunjan Shah Security Consultant Foundstone Professional Services

      Add to Reading List

      Source URL: www.mcafee.com

      Language: English - Date: 2014-01-10 01:08:54
        9Cloud standards / Atom / Data management / Open Data Protocol / Uniform resource identifier / Representational state transfer / Metadata / Resource / XML / Computing / Technical communication / URI schemes

        White Paper A Pentester’s Guide to Hacking OData Gursev Singh Kalra, Principal Consultant McAfee® Foundstone® Professional Services

        Add to Reading List

        Source URL: media.blackhat.com

        Language: English - Date: 2012-12-06 13:02:53
        10Smartphones / Electronics / IOS version history / IOS / Apple Inc. / ITunes / IPhone 3G / IPhone 4S / Software / Computing / IPhone

        White Paper Top 10 iPhone Security Tips By Kunjan Shah, Principal Consultant, McAfee® Foundstone® Professional Services White Paper

        Add to Reading List

        Source URL: www.mcafee.com

        Language: English - Date: 2014-01-10 01:08:58
        UPDATE