OWASP

Results: 546



#Item
281Public safety / Cyberwarfare / Computer security / Computer network security / Security / OWASP

The Need for Confluence The Essential Role of Incident Response in Secure Software Development OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:25
282Software testing / Security / Penetration test / Hacking / OWASP / Application security / Vulnerability / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

Automated vs. Manual: You can’t filter The Stupid AppSec DC Charles Henderson

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:20
283Software development process / Computing / Security / United States / Internet censorship / Internet / Stop Online Piracy Act / Information security / Agile software development / DevOps / Information technology management

Security is Dead. Long Live Rugged DevOps: IT at Ludicrous Speed… Joshua Corman & Gene Kim AppSecDC

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:55:31
284Computer network security / Crime prevention / National security / OWASP / Application security / Information security / Web application security / Vulnerability / Penetration test / Security / Computer security / Cyberwarfare

dartalis Security Awareness for Web Developers dartalis S.A.

Add to Reading List

Source URL: www.dartalis.lu

Language: English - Date: 2014-08-27 09:35:56
285OAuth / Technology / Braun / Shaving / Bastian

A Doorman for Your Home – Control-Flow Integrity Means in Web Frameworks Bastian Braun [removed] joint work with Christian v. Pollak

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-09-02 15:52:58
286Internet protocols / Internet standards / Trivial File Transfer Protocol / Password / Telnet / File Transfer Protocol / Internet / Network architecture / Computing

News from Camp 4 Reid Wightman [removed] AppSecDC, 2012 Today

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:52:55
287Computer network security / Cloud computing / OWASP / Application security / Software as a service / Legacy system / Application software / HP Application Security Center / Application firewall / Computing / Security / Computer security

Application Portfolio Risk Ranking Banishing FUD With Structure and Numbers Dan Cornell OWASP AppSec DC 2010 November 11th, 2010

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:52
288

W ESTFÄLISCHE W ILHELMS -U NIVERSITÄT M ÜNSTER Über Agenten und Trittbrettfahrer: Web-Sicherheit als öffentliches Gut

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2014-12-13 17:40:36
    289Cyberwarfare / Software testing / National security / Penetration test / OWASP / Vulnerability / IOS jailbreaking / Application software / IOS / Computer security / Computer network security / Security

    The OWASP Foundation http://www.owasp.org Security Testing Guidelines for mobile Apps Florian Stahl

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2014-02-24 04:13:33
    290

    The "Easy" Button for Your Web Application Security Career @grecs

    Add to Reading List

    Source URL: www.owasp.org

    - Date: 2012-04-18 21:57:40
      UPDATE