OWASP

Results: 546



#Item
231Economy of the United States / Technology / Electronic engineering / Integrated Digital Enhanced Network / Motorola / Verizon Communications

What  the  Cyber  Criminals  are  Doing   on  Your  Website  (Right  Now)   Front  Range  OWASP  Conference   March  22,  2012      

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-10 22:58:12
232Health Insurance Portability and Accountability Act / Software as a service / Computer security / Platform as a service / IICCRD / Cloud communications / Cloud computing / Centralized computing / Computing

Private Information Protection in Cloud Computing – laws, Compliance and Cloud Security Misconceptions Special research prepared by Rubos, Inc. team (We do independent research on security matters in various domains)

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:52:25
233Security / OWASP / Software testing / Application security / Web application security / Vulnerability / Threat model / Threat / Penetration test / Computer security / Cyberwarfare / Computer network security

-[removed]The OWASP Application Security Code of Conduct for Standards Groups

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:19:49
234Hacking / Software testing / Cross-platform software / JavaScript / OWASP / Adobe Acrobat / Malware / Vulnerability / Portable Document Format / Computing / Software / Computer security

Drive By Downloads How to Avoid Getting a Cap Popped in Your App OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:46
235OWASP / Cyberwarfare / Application security / Web application security / Penetration test / Computer network security / Security / Computer security

-[removed]The OWASP Application Security Code of Conduct for Government Bodies

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:20:03
236Security / DNS rebinding / Very-high-bit-rate digital subscriber line / Computing / Internet / Digital subscriber line / Computer network security / OWASP

WELCOME Note • Welcome !! – OWASP AppSec Research – Hamburg / Germany

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 17:40:30
237Information Systems Examination Board / Modbus / Web server / Control engineering / Technology / Automation / British Computer Society

Eireann Leverett MPhil BEng CSSA CSSLP ISEB @blackswanburst [removed]  On

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:48:11
238Security / SAP / OWASP / Computer network security / ABAP / Penetration test / SAP NetWeaver / SAPgui / SAP AG / Computing / Software / Business software

Hardening of SAP® HTTP- and Webservices Frederik Weidemann OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:40
239Computing / C++ / Sizeof / Cross-platform software / Struct / C / C syntax / Computer programming / C programming language / Software engineering

Static Analysis and code review A journey through time Migchiel de Jong Software Security Consultant @ HP ESP - Fortify

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-12-02 11:17:08
240Cross-site request forgery / Hacking / Clickjacking / Spamming / JavaScript / Phishing / World Wide Web / Content Security Policy / OWASP / Computing / Cybercrime / Social engineering

How Mozilla Does Web Security Brandon Sterne OWASP AppSec[removed]DC Agenda

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:09
UPDATE