OWASP

Results: 546



#Item
171Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:01:24
172Relational database management systems / Database management systems / Data security / National security / Oracle Database / Copyright law of the United States / Oracle Corporation / Password / Database / Data / Information / Data management

Microsoft PowerPoint - Oracle_Security_OWASP_Leeds_2009

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2009-10-15 08:21:45
173Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:50:30
174Relational database management systems / Cross-platform software / Pete Finnigan / Oracle Corporation / Database management systems / Oracle Database / Password / Copyright law of the United States / Copyright / Software / Data / Information

Microsoft PowerPoint - Oracle_Security_OWASP_Leeds_2009

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2009-10-15 08:21:07
175Software / Man-in-the-middle attack / Electromagnetism / Electrical engineering / Relay / Internet privacy / Cryptographic software / Tor

Surfing safely over the Tor anonymity network Georg Koppen – Philipp Winter – How does Tor work?

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-03-20 15:08:09
176

Güvenli Uygulama Geliştirme Android Bedirhan Urgun • OWASP, www.owasp.org • OWASP Turkey, www.webguvenligi.org

Add to Reading List

Source URL: www.webguvenligi.org

Language: Turkish - Date: 2012-05-23 08:37:29
    177

    WGT Capture the Flag Onur Yılmaz, Aralık 2009, WGT E-Dergi 3. Sayı OWASP-Türkiye e-posta grubuna geçtiğimiz günlerde gönderilen CTF yarışmasının çözümünü aşağıda bulabilirsiniz. İki aşamadan oluşan

    Add to Reading List

    Source URL: webguvenligi.org

    Language: Turkish - Date: 2011-08-03 19:41:17
      178

      Microsoft Word - OWASP Testing Guide_[Foreword - Introduction__Taygun Alban.doc

      Add to Reading List

      Source URL: www.webguvenligi.org

      Language: Turkish - Date: 2008-10-06 07:29:23
        179

        ModSecurity İle Web Güvenliği Ve OWASP Bunyamin Demir OWASP-Turkey Chapter Lead OWASP-WeBekci Project

        Add to Reading List

        Source URL: www.webguvenligi.org

        Language: Turkish - Date: 2008-08-15 14:01:57
          180

          Microsoft Word - OWASP Testing Guide_[Information Gathering - Spidering and Googling__Bedirhan Urgun.doc

          Add to Reading List

          Source URL: www.webguvenligi.org

          Language: Turkish - Date: 2008-10-06 07:29:42
            UPDATE