OWASP

Results: 546



#Item
221

Decoding Bug Bounty Programs Jon Rose It’s all about

Add to Reading List

Source URL: www.owasp.org

- Date: 2013-04-16 11:24:35
    222

    AppSec Germany 010 Sicherheit von Webanwendungen als Maßnahme zum Schutz personenbezogenener Daten Ein Entwurf für

    Add to Reading List

    Source URL: www.owasp.org

    Language: German - Date: 2011-12-11 14:42:24
      223Cyberwarfare / Internet standards / Electronic commerce / Application security / Penetration test / OWASP / Web application security / Instant messaging / Transport Layer Security / Computing / Computer security / Computer network security

      Mobile Application Security Best Practices to Optimize Security July 2014 Email: [removed] | Website: www.qburst.com

      Add to Reading List

      Source URL: www.qburst.com

      Language: English
      224

      OWASP Top 10 – Was t/nun? Dirk Wetter OWASP

      Add to Reading List

      Source URL: www.owasp.org

      Language: German - Date: 2011-12-11 14:43:34
        225Query languages / Data / Computer languages / SQL injection / Java Persistence Query Language / OWASP / Password / Update / Data Definition Language / Data management / Computing / SQL

        Top Ten Defenses OWASP Cheatsheet Series 1

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2012-11-29 17:22:53
        226Cloud computing

        Linking Security to Business Value in the Customer Service Industry “Cash in on practicing security.” Dan Rojas March 28, 2013

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2013-04-16 11:05:26
          227Computer network security / OWASP / Software testing / Hacking / Vulnerability / Secure Shell / Computer security / Cyberwarfare / Security

          Side Channel Vulnerabilities on the Web - Detection and Prevention OWASP

          Add to Reading List

          Source URL: www.owasp.org

          Language: English - Date: 2011-12-11 14:42:29
          228

          PDF Document

          Add to Reading List

          Source URL: www.owasp.org

          - Date: 2012-04-11 09:28:24
            229Cyberwarfare / Computer network security / Identity management / Identity management systems / Security Assertion Markup Language / Penetration test / OWASP / Vulnerability / Security testing / Computer security / Software testing / Security

            The SPaCIoS Tool property-driven and vulnerability-driven security testing for Web-based apps Luca Compagna, Product Security Research, SAP AG (on behalf of SPaCIoS consortium)

            Add to Reading List

            Source URL: www.owasp.org

            Language: English - Date: 2013-09-29 18:37:08
            230OWASP / Cyberwarfare / Application security / Web application security / OWASP Mantra Security Framework / Computer network security / Computer security / Security

            -[removed]The OWASP Application Security Code of Conduct for Trade Organizations

            Add to Reading List

            Source URL: www.owasp.org

            Language: English - Date: 2013-03-27 15:20:34
            UPDATE