OWASP

Results: 546



#Item
271Computer network security / Software engineering / Security / Application security / Software development process / Vulnerability / Web application security / Software development / OWASP / Computer security / Computing / Cyberwarfare

Proactive risk mitigation within the Software Development Lifecycle (SDLC) Real world examples that have worked for me, … Joe White, CISSP, CSSLP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:52:42
272

Oportunidades de Patrocínio OWASP AppSec Brasil 2010 Cursos: Evento:

Add to Reading List

Source URL: www.owasp.org

Language: Portuguese - Date: 2011-12-11 14:42:23
    273

    UI-Redressing-Angriffe auf Android Marcus Niemietz Ruhr-Universität Bochum

    Add to Reading List

    Source URL: www.owasp.org

    Language: German - Date: 2012-11-09 12:39:07
      274Visualization / Computer graphics / Computational science / Big and Ugly Rendering Project / Macro / Data visualization / Plug-in / Computing / Computer programming / Software

      HackPra Burp Pro: Real-life tips & tricks Hamburg

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2013-09-03 17:41:56
      275Quantum field theory / OWASP / Security / Static program analysis / Penetration test / WebSocket / DevOps / Propagator / Java / Computing / Software development / Physics

      Jeff Williams, CEO OWASP AppSec DC April 4, 2012 Architecture Review

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:58:12
      276Electronics / Technology / Android / Motorola Droid / HTC Desire / OWASP / Samsung Galaxy S / HTC / Droid / Smartphones / Android devices / Computing

      Behind Enemy Lines Practical & Triage Approaches to Mobile Security Abroad Presentation Objectives ‣

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:47:39
      277

      PDF Document

      Add to Reading List

      Source URL: www.owasp.org

      - Date: 2013-12-02 11:17:19
        278Software / MySQL / Antidiarrhoeals / Laudanum / Opiates / Penetration test / Copyright law of the United States / SQL injection / Copyright / Data / Data management / Information

        Injectable Exploits New Tools for Pwning Web Apps and Browsers Kevin Johnson – [removed] Justin Searle – [removed] Frank DiMaggio – [removed]

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2011-12-11 14:43:51
        279Password / Computer network security / Malware / Penetration test

        Ryan Kazanciyan Principal Consultant Old Web Shells, New Tricks AppSec DC 2012

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2012-04-18 21:51:05
        280Smartphones / Android / Free software / OWASP / Filesystem permissions / Application security / Operating system / Android Market / Software / Computing / Embedded Linux

        An In-Depth Introduction to the Android Permission Model and How to Secure Multi-Component Applications Jeff Six

        Add to Reading List

        Source URL: www.owasp.org

        Language: English - Date: 2012-04-18 21:42:10
        UPDATE