OWASP

Results: 546



#Item
251Identity / Federated identity / Security Assertion Markup Language / OWASP / Identity provider / OpenID / Penetration test / XML Signature / PERMIS / Computer security / Identity management / System software

On Breaking SAML: Be Whoever You Want to Be Juraj Somorovsky and Christian Mainka

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-09 12:50:39
252Software / Node.js / Application security / JavaScript / Computer programming / Computer network security / Computing / Security / OWASP

Node.js Security" Old vulnerabilities in new dresses German OWASP Day 2012 November 7th 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-09 12:44:19
253Security / Intrusion detection system / OWASP / Application security / Vulnerability / Snort / Evasion / Attack / Computer security / Cyberwarfare / Computer network security

OWASP AppSensor In Theory, In Practice and In Print AppSec Research 2013, Hamburg, Germany, 23rd August 2013 Colin Watson, Watson Hall Ltd Dennis Groves, Desago Ltd

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 16:50:03
254Platform as a service / Software as a service / Novell Cloud Security Service / IBM cloud computing / Centralized computing / Cloud computing / Computing

CLOUD SECURITY AND IT’S EFFECT ON APPLICATION SECURITY Dennis Hurst Security Engineer, HP Founding member: Cloud Security Alliance

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:05
255Paillier cryptosystem / Public-key cryptography / Relational database management systems / Query languages / SQL / Select / Where / SQL keywords / Data management / Computing

Cloud  encryp-on  –     Encrypt  all  the  things!   Walter  Tighzert   German  Owasp  Day  2014   About  me  

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:47:56
256SCADA / Telemetry / Security / Cyber-physical system / Computer security / Computing / Technology / Cyberwarfare / Industrial automation

Survivable Software for Safety-Critical CyberPhysical Systems Karen Mercedes Goertzel, CISSP Lead Associate[removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:57:15
257

O-Saft Richtig verschlüsseln mit SSL/TLS  OWASP Day Germany 2014, Hamburg, 9. Dezember 2014

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2014-12-13 18:03:14
    258Cross-platform software / Security / Computer network security / Java programming language / String Buffer / OWASP / Pointer / Java / C / Computing / Computer programming / Software engineering

    Code Review: Prinzipien und Grenzen Dr. Bruce Sams OPTIMAbit GmbH

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2012-11-09 12:51:59
    259

    What is this talk about? ● ● ● REVERSE ENGINEERING

    Add to Reading List

    Source URL: www.owasp.org

    - Date: 2012-04-18 21:53:34
      260Security / ModSecurity / OWASP / SQL injection / Evasion / Apache HTTP Server / Software / Computing / Computer security

      Web Application Defense with Bayesian Attack Analysis Presented by: Ryan Barnett

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:59:04
      UPDATE