OWASP

Results: 546



#Item
361Reflection / OWASP / Objective-C / Fantom / Computing / Software engineering / Computer programming

Laufzeitanalyse & Manipulation von Apple iOS Apps Andreas Kurtz OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-09 12:46:11
362Computing / OWASP / Penetration test / Application security / WebScarab / Web application security / Vulnerability / Computer network security / Computer security / Cyberwarfare

OWASP ROI: Optimize Security Spending using OWASP OWASP Austin

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:26
363Data management / Cross-platform software / SQL / Oracle Database / Oracle Corporation / SQL injection / Oracle Application Express / PL/SQL / Relational database management systems / Computing / Software

Hacking Oracle From Web: Part 2

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:50:35
364World Wide Web / Internet privacy / Information privacy / Facebook / Winston Smith Project / Privacy / Ethics / Computing

Top 10 Privacy Risks Project Results presentation @ German OWASP Day[removed]December 2014, Hamburg

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-12-13 17:44:41
365HTTP cookie / Device fingerprint / Privacy mode / Internet privacy / Internet / Computing

Everything you always wanted to know about web-based device fingerprinting (but were afraid to ask) Nick Nikiforakis

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-12-01 13:33:16
366JavaScript / Web development / OWASP / XMLHttpRequest / Cross-site request forgery / JSON / Document Object Model / Web application / Cross-site scripting / Computing / World Wide Web / Ajax

Development Issues within AJAX Applications: How to Divert Threats OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:11
367

German OWASP Day 2012 Datum: 07. November 2012 Sponsoring Platin-Sponsor:

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2012-07-28 03:04:58
    368Computing / OWASP / Web application security / Application security / Vulnerability / Cross-site request forgery / SQL injection / ModSecurity / Threat / Computer security / Computer network security / Cyberwarfare

    The Web Hacking Incidents Database (WHID) Report: January – June 2009 AppSec DC

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:42:50
    369Computer network security / Secure communication / OWASP / Software testing / Vulnerability / Data breach / Computer security / Cyberwarfare / Security

    Cloudy with a chance of hack OWASP Lars Ewe CTO / VP of Eng.

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:42:30
    370Content management systems / World Wide Web / Multi-agent systems / Spamming / Security / Botnet / OWASP / Computer security / WordPress / Software / Computer network security / Computing

    th 5 OWASP BeNeLux-Day 2013 Good morning &

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2013-12-02 11:33:31
    UPDATE