OWASP

Results: 546



#Item
391OWASP / Cyberwarfare / OWASP Mantra Security Framework / Security / Computer security / Computer network security

The  OWASP  Application  Security  Code  of  Conduct  for  Trade  Organizations        

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:25:48
392Public safety / Cyberwarfare / Security / OWASP / Computer network security

The  OWASP  Application  Security  Code  of  Conduct  for  Certifying  Bodies        

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-04-02 06:22:28
393

Social Zombies: Your Friends Want to Eat Your Brains Kevin Johnson Tom Eston AppSec DC November 12, 2009

Add to Reading List

Source URL: www.owasp.org

- Date: 2011-12-11 14:43:27
    394

    Closing Ceremony • We face the final curtain ;-/ – AppSec Conference – View from the building ;-) – Hamburg

    Add to Reading List

    Source URL: www.owasp.org

    - Date: 2013-09-02 16:19:42
      395Computing / Software testing / Security / Application security / Penetration test / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

      Jumpstart a Web Application Secure Coding Program: A Five Step Process SANS STI Application Security Written Assignment Author:  Jim  Beechey,  [removed]   Advisor:  Johannes  Ulrich  

      Add to Reading List

      Source URL: www.sans.edu

      Language: English - Date: 2012-10-09 13:59:40
      396SCADA / Telemetry / Electrical grid / Electromagnetism / Technology / Electric power transmission systems / Industrial automation

      Pentes&ng  Smart  Grid   Web  Apps     Jus%n  Searle   Managing  Partner  –  U%liSec  

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-18 21:51:53
      397OWASP / Computer network security / Software testing / Application security / Vulnerability / Password / Database security / Access control / CCWAPSS / Security / Computer security / Cyberwarfare

      OWASP Secure Coding Practices Quick Reference Guide Justin Clarke [removed]

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-04-30 09:26:31
      398Crime prevention / Data security / Information security / Application security / Vulnerability / OWASP / National Security Agency / Key management / Cryptography / Security / Computer security / National security

      Microsoft PowerPoint - OWASPSanAntonio_2006_06_Crypto_Content.ppt

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:42:27
      399Electronic commerce / Secure communication / Crime prevention / National security / Cyberwarfare / Computer security / Security and safety features new to Windows Vista / Windows Server / Computer network security / Security / Computing

      Securing J2EE Applications – Coding Patterns for Secure Connections to Services Jeff Williams Aspect Security CEO [removed]

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:43:22
      400Network performance / Computer network security / Proxy server / MongoDB / Reverse proxy / WebScarab / JSON / OWASP / Tor / Computing / Computer networking / Internet privacy

       Martin Holst Swende  Senior Security Consultant, 2Secure AB  ~3 years in IT-security  ~5 years as software developer

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:43:52
      UPDATE