HTTP Strict Transport Security

Results: 30



#Item
21Cryptographic protocols / Internet / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Strict Transport Security / Session hijacking / SSL acceleration / Cryptography / Secure communication / Computing

SSL Server Rating Guide version 2009i (8 December[removed]Copyright © [removed]Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2015-01-19 14:14:14
22Cryptographic protocols / Secure communication / Security / Internet privacy / HTTP Strict Transport Security / HTTP Secure / Transport Layer Security / Phishing / HTTP cookie / HTTP / Internet / Computing

Security Analysis of the Chinese Web: How well is it protected? Ping Chen† , Nick Nikiforakis‡ , Lieven Desmet† , Christophe Huygens† † iMinds-DistriNet, KU Leuven, 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-12-01 17:47:28
23HTTP / Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / HTTP cookie / Google Chrome / HTTP Strict Transport Security / JavaScript / Computing / Software / Computer security

Large-scale Security Analysis of the Web: Challenges and Findings Tom van Goethem, Ping Chen, Nick Nikiforakis, Lieven Desmet, and Wouter Joosen iMinds-DistriNet, KU Leuven 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-05-19 11:26:35
24Domain Name System Security Extensions / X.509 / Man-in-the-middle attack / Public key infrastructure / Public key certificate / HTTP Strict Transport Security / Certificate authority / Cryptography / Public-key cryptography / Key management

Abstract - The Search for Trust

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2013-03-14 11:58:17
25HTTP Strict Transport Security / HTTP cookie / Firesheep / JavaScript / Cross-site scripting / HTTP Secure / Content Security Policy / World Wide Web / Firefox / Software / HTTP / Computing

Microsoft Word - Protecting web applications.docx

Add to Reading List

Source URL: www.asd.gov.au

Language: English - Date: 2012-09-27 02:43:59
26Cyberwarfare / Password / Cross-site scripting / Web application security / HTTP Secure / HTTP cookie / Login / Cross-site request forgery / HTTP Strict Transport Security / HTTP / Computing / Computer security

Securing Web Application Technologies (SWAT) CH E CKL I S T The SWAT Checklist provides an easy to reference set of best practices that raise awareness and help development teams create more secure applications. It’s a

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2013-02-12 10:08:44
27HTTP / Cryptographic protocols / Secure communication / HTTP Strict Transport Security / HTTP Secure / Transport Layer Security / Extended Validation Certificate / Firesheep / Session hijacking / Cryptography / Key management / Public-key cryptography

Always-On SSL Whitepaper by CA Security Council

Add to Reading List

Source URL: casecurity.org

Language: English - Date: 2014-01-16 10:55:56
28News aggregators / Secure communication / Web browsers / Cross-platform software / HTTP Secure / JavaScript / HTTP Strict Transport Security / Google Chrome / Transport Layer Security / Software / Computing / HTTP

PDF Document

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-03-17 10:15:28
29Cryptographic protocols / Internet protocols / Internet / Internet standards / Electronic commerce / Transport Layer Security / HTTP Strict Transport Security / Qualys / Session hijacking / Cryptography / Secure communication / Computing

PDF Document

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2014-07-23 05:48:04
30Secure communication / Internet standards / Key management / Transport Layer Security / Cipher suite / HTTP Strict Transport Security / Qualys / Extended Validation Certificate / Certificate authority / Cryptography / Internet protocols / Cryptographic protocols

SSL/TLS Deployment Best Practices

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2014-06-09 13:32:28
UPDATE