OWASP

Results: 546



#Item
311Computer network security / OWASP / Computing / Snort / Sourcefire / Computer security / Software / Security

Custom Intrusion Detection Techniques for Monitoring Web Applications Matthew Olney Sourcefire VRT

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:51
312

Sicherheitsanforderungen:  o2  vernachlässigt,  dabei   sehr  nützlich!   Prof.  Dr.  Sachar  Paulus Fachhochschule  Brandenburg

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2012-11-09 12:40:40
    313Cyberwarfare / Computer security / Computing / Application security / Web application security / Computer network security / Security / OWASP

    -[removed]The OWASP Application Security Code of Conduct for Certifying Bodies

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2013-04-02 06:23:00
    314Public safety / Prevention / Computer security / Security / OWASP / Computer network security

    CEO of You Inc. AppSec DC Lee Kushner President

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:05
    315Software development / Computing / Internet protocols / HTTP / HTTP Secure / DevOps / RC4 / Cipher suite / Man-in-the-middle attack / Cryptography / Secure communication / Cryptographic protocols

    Recipes for enabling HTTPS The DevOps Approach to Setting up Robust HTTPS Web Apps [removed]

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2013-09-02 17:08:46
    316Web development / Graphics file formats / Adobe software / Cross-platform software / Adobe Flash Player / SWF / WebSocket / Copyright law of the United States / Internet / Software / Computing / Adobe Flash

    Friendly Traitor II: Features are hot, but giving up our secrets is not! Kevin Johnson [removed[removed]

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:34
    317Automation / WebScarab / Computing / Cyberwarfare / Prevention / Security / Computer network security / OWASP

    Scalable Application Assessments in the Enterprise Tom Parker / Lars Ewe Securicon, LLC / Cenzic

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:33
    318

    AppSec Germany[removed]Der Application Security Verification Standard (ASVS) OWASP

    Add to Reading List

    Source URL: www.owasp.org

    Language: German - Date: 2011-12-11 14:43:45
      319Crime prevention / National security / Computer security / Software assurance / Software development process / Application security / Software bug / Capability Maturity Model Integration / Requirement / Software development / Software quality / Computer network security

      What can an Acquirer do to prevent developers from make dangerous software errors? OWASP AppSec DC 2012 April 5, 2012

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:59:35
      320OWASP / Chief information security officer / Public safety / Cyberwarfare / Application security / Security / Computer network security / Computer security

      OWASP The OWASP Foundation http://www.owasp.org AppSec EU 2013

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2013-09-13 17:46:04
      UPDATE