OWASP

Results: 546



#Item
211Security / Penetration test / Attack / Timing attack / Computer network security / Cyberwarfare / Computer security

INCIDENT RESPONSE & INVESTIGATION SERVICES • PENETRATION TESTING • SECURITY RESEARCH • SOFTWARE ENGINEERING SECURITY ASSURANCE • SECURITY ARCHITECHTURE & DESIGN ASSURANCE • TRAINING Pixel Perfect Timing Attacks

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-03 09:26:33
212

Lost  in  Transla,on:   Missverständnisse  zwischen  Mensch  und  Maschine   und  deren  Auswirkungen  auf    Web-­‐Security   Dr.  Sebas,an  Schinzel   Forschung:

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2012-11-09 12:45:35
    213Man-in-the-middle attack / Secure communication / Internet standards / Cryptographic protocols / Cryptography / Convergence / Verisign

    A Qualitative Comparison of SSL Validation Alternatives OWASP AppSec Research 2013 August 22nd, 2013 Henning Perl, Sascha Fahl, Michael Brenner, and Matthew Smith Leibniz Universität Hannover

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2013-09-29 17:20:56
    214Computer security / Scripting languages / Ruby on Rails / Web 2.0 / Mutchler / Access control / Ruby / Computing / Software / Computer programming

    GuardRails A (Nearly) Painless Solution to Web Application Security Jonathan Burket, Patrick Mutchler, Michael Weaver, Muzzammil Zaveri University of Virginia http://guardrails.cs.virginia.edu

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:42:28
    215Botnets / Computer network security / Spamming / Software / Malware / Computing / Scareware

    How Malware Attacks Web Applications Casey Smith SnowFROC 2013 About Me

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2013-04-09 11:30:30
    216

    OWASP Germany Applikationen als neuer Security Perimeter Alexander Meisel art of defence GmbH

    Add to Reading List

    Source URL: www.owasp.org

    Language: German - Date: 2011-12-11 14:42:26
      217

      Defending Desktop Applications: Mitigating in the Dark AppSec 2013 Jon McCoy www.DigitalBodyGuard.com

      Add to Reading List

      Source URL: www.owasp.org

      - Date: 2013-04-09 11:34:43
        218SQL keywords / Data / SQL / SQL injection / Computer languages / Java Persistence Query Language / OWASP / Password / Update / Data management / Computing / Query languages

        Top Ten Web Application Defenses Jim Manico @manicode

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2013-04-16 11:10:31
        219Forensic science / Heuristics / Cloud computing / Computer forensics / Computing / Crime / Database forensics / Department of Defense Cyber Crime Center / Digital forensics / Cybercrime / Criminology

        Logo_lockup_version-2 SPOT

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2013-04-09 11:30:47
        220

        Der Weg ist das Ziel – Kontrollfluss-Integrität in Web-Applikationen sichern Bastian Braun (gemeinsame Arbeit mit Patrick Gemein, Hans P. Reiser) Institute of IT-Security and Security Law (ISL), Universität

        Add to Reading List

        Source URL: www.owasp.org

        Language: German - Date: 2012-11-09 12:49:35
          UPDATE