OWASP

Results: 546



#Item
151Computer network security / Malware / Application security / Vulnerability / Cyberwarfare / Security / Computer security

AppSec ILMobile Security Attacks A Glimpse From the Trenches Yair Amit

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-09 04:01:23
152Security / Software testing / OWASP / Penetration test / Logic / SQL injection / Computer network security / Computer security / Cyberwarfare

The Art of Exploiting Logical Flaws in Web Apps Sumit “sid” Siddharth Richard “deanx” Dean A GREAT COLLABORATION!

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:14:23
153

脆弱性検査ツール『OWASP ZAP』 ハンズオン in 大阪 [OWASP Kansai主催] 亀田 勇歩

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: Japanese - Date: 2015-02-14 13:22:10
    154

    PDF Document

    Add to Reading List

    Source URL: www.owasp.org

    - Date: 2011-12-11 14:43:18
      155Credit cards / Security / Cyberwarfare / Payment Card Industry Data Security Standard / Application security / Payment card industry / OWASP / Information security / Vulnerability / Computer security / Payment systems / Data privacy

      Parkeon Chooses Quotium’s Seeker for Agile Code Security and PCI Compliance Overview Parkeon is a key player in the urban mobility sector and a global provider of parking and transport management solutions. Parkeon off

      Add to Reading List

      Source URL: www.quotium.com

      Language: English - Date: 2014-04-04 10:57:44
      156Scripting languages / High-level programming languages / Procedural programming languages / Yasca / Java platform / Plug-in / OWASP / JavaScript / Perl / Computing / Software / Cross-platform software

      Introduction To Yasca Presented at NYPHP 24 February 2009

      Add to Reading List

      Source URL: nyphp.org

      Language: English - Date: 2015-05-21 04:40:36
      157ColdFusion / Web development software / Veracode / Macromedia JRun / Adobe Flex / OWASP / Macromedia / Computing / Software / Adobe software

      Deconstructing ColdFusion Chris Eng and Brandon Creighton CanSecWest – March 11, 2011 Hi

      Add to Reading List

      Source URL: cansecwest.com

      Language: English - Date: 2011-03-11 11:57:06
      158Computing / Hacking / Software testing / Hacker / Malware / Denial-of-service attack / Vulnerability / Exploit / OWASP / Computer security / Cyberwarfare / Computer network security

      Webapp Security Fengshui (HKEx-Triggered Edition) 網站漏洞風水(港交所加強版) {Alan  Ho,  Anthony  Lai},  VXRL   VXRL

      Add to Reading List

      Source URL: archive.isoc.hk

      Language: English - Date: 2011-09-08 09:46:04
      159Cyberwarfare / Crime prevention / National security / Chief information security officer / OWASP / Application security / Web application security / Information security / Threat / Computer security / Security / Computer network security

      CISO Survey and Report CISO Survey and Report 2013 VersionJanuaryProject Lead and Main Author

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2014-02-25 15:07:50
      160OWASP / Vulnerability / Computer security / Security / Cyberwarfare

      Jeff Williams Röportajı OWASP Turkey, Aralık 2010, WGT E-Dergi 7. Sayı 1. How did you end up dealing with web/application security? The short answer is that I’ve been making software fail since the early 1980’s a

      Add to Reading List

      Source URL: webguvenligi.org

      Language: English - Date: 2011-08-03 19:54:09
      UPDATE