OWASP

Results: 546



#Item
111Software testing / Security / Penetration test / OWASP / Vulnerability / Threat / Computer security / Cyberwarfare / Computer network security

Cash is King Who’s Wearing Your Crown? Accounting Systems Fraud in the Digital Age Tom Eston and Brett Kimmell Agenda

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 14:09:35
112Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:50:30
113Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:50:30
114Computer network security / Software / Cloud clients / Software testing / Malware / Mobile application development / IPhone / Rooting / Proprietary software / Computing / Smartphones / Computer security

Android / iPhone Risks and Solutions Part of the Reverse Engineering and Code Modification Prevention OWASP Project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-29 15:31:05
115Smartphones / ITunes / Multi-touch / IOS jailbreaking / IOS / Botnet / Pwn2Own / Safari / Libtiff / Software / IPhone / Computing

Consequences of a Jailbroken iDevice Part of the Reverse Engineering and Code Modification Prevention Umbrella

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-09 16:53:18
116Cross-platform software / Cross-site scripting / PHP programming language / HTML / PHP / Cascading Style Sheets / CSS / String interpolation / Computing / Software / Scripting languages

Cross Site Scripting (XSS) and PHP Security Anthony Ferrara NYPHP and OWASP Security Series June 30, 2011

Add to Reading List

Source URL: nyphp.org

Language: English - Date: 2015-05-22 11:37:54
117A / ISO 216 / Motorways of Switzerland

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-07-22 18:27:59
118

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: Swedish - Date: 2011-12-11 14:42:49
    119OWASP / Security / Feedback

    PDF Document

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2014-09-26 19:14:44
    120Heap spraying / Address space layout randomization / Vulnerability / Buffer overflow / Shellcode / Heap feng shui / Alexander Sotirov / Exploit / Computer security / Cyberwarfare / Failure

    PDF Document

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2014-09-16 18:43:29
    UPDATE