OWASP

Results: 546



#Item
331OWASP / Cyberwarfare / Penetration test / Application security / Small Arms Protective Insert / Computer network security / Computer security / Security

OWASP Enterprise Security API (ESAPI) for C Plus Plus Dan Amodio ESAPI for C Project Leader [removed] [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:48:38
332

Cloudy with a chance of 0-day OWASP Jon Rose

Add to Reading List

Source URL: www.owasp.org

- Date: 2011-12-11 14:43:38
    333Social engineering / Spamming / Password / Crime / Computer security / Password manager / Security / Computer network security / Phishing

    Making systems secure and usable – what can software developers do? M. Angela Sasse Professor of Human-Centred Technology Director, Academic Centre of Excellence for Cyber Security

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2012-11-14 18:23:05
    334Software testing / Cross-platform software / Scripting languages / Computer network security / OWASP / Penetration test / Vulnerability / Application security / PHP / Computing / Software / Computer security

    OWASP BROKEN WEB APPLICATIONS PROJECT Chuck Willis [removed] OWASP AppSec DC

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:50
    335Ajax / HTML / OWASP / Security / JavaScript / Document Object Model / HTML5 / Web application / XMLHttpRequest / Computing / World Wide Web / Web development

    Microsoft PowerPoint - Shreeraj_Shah_DOMJacking_OWASP.ppt [Compatibility Mode]

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2012-04-18 21:41:26
    336

    Programação Segura utilizando Análise Estática Philippe Sevestre Consultor Associado – LeadComm Applications & Database Security

    Add to Reading List

    Source URL: www.owasp.org

    Language: Portuguese - Date: 2011-12-11 14:43:06
      337Security / OWASP / Software testing / Data security / Vulnerability / Threat / Information security management system / Penetration test / Application security / Computer security / Cyberwarfare / Computer network security

      The  OWASP  Application  Security  Code  of  Conduct  for  Development  Organizations        

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2013-03-27 15:26:03
      338Open formats / Web browsers / Hypertext Transfer Protocol / POST / Python / Proxy server / Computing / HTTP / World Wide Web

      Python Basics for Web App Pentesters Part 2 Justin Searle

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:53:14
      339Cerebrum / Limbic system / Neuroanatomy / Memory / Neuropsychology / Amygdala hijack / Stress / Amygdala / Emotion / Brain / Anatomy / Cognitive science

      Security Is Like An Onion

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:55:46
      340

      David Ross Principal Software Security Engineer Trustworthy Computing Security Microsoft @randomdross

      Add to Reading List

      Source URL: www.owasp.org

      - Date: 2013-09-02 16:43:18
        UPDATE