OWASP

Results: 546



#Item
421Electronic commerce / Cryptographic protocols / DigiNotar / Secure communication / Transport Layer Security / Certificate authority / HTTP Strict Transport Security / Comodo Group / OWASP / Cryptography / Key management / Public-key cryptography

OWASP The OWASP Foundation http://www.owasp.org AppSec APAC 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-05-29 09:25:47
422Computer network security / Crime prevention / National security / OWASP / Application security / Vulnerability / Information security / Verification / Cross-site scripting / Computer security / Cyberwarfare / Security

Microsoft Word - OWASP_ASVS_Version_2.docx

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-08-27 05:29:15
423Computer network security / Software testing / Hacking / OWASP / Vulnerability / SQL injection / Cross-site scripting / Code injection / Application firewall / Computer security / Cyberwarfare / Security

HTTP Parameter Pollution Vulnerabilities in Web Applications Marco `embyte` Balduzzi Swiss Cyber Storm[removed]May 2011

Add to Reading List

Source URL: media.hacking-lab.com

Language: English - Date: 2011-06-08 04:51:58
424

Quellcodescans von Webanwendungen in der Praxis Gängige Fallstricke und Wege zum erfolgreichen Einsatz in Unternehmen Sebastian Schinzel

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2011-12-11 14:42:56
    425Security / Software testing / OWASP / Penetration test / Threat model / Vulnerability management / Vulnerability / Software development process / Software bug / Computer security / Computer network security / Cyberwarfare

    No reason to be SAD? The Integration of a Secure Software Development Life Cycle in OSS Enterprise Web Applications OWASP

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:25
    426Security / OWASP / Cross-site scripting / JavaScript / Application security / Document Object Model / Computing / Computer security / Cyberwarfare

    Finding DOMXSS With DOMinator OWASP Goteborg Nov. 2011

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:42:16
    427

    Don’t touch that system A quick primer on incident response Rikard Bodforss, Omegapoint Commercial break!

    Add to Reading List

    Source URL: www.owasp.org

    - Date: 2013-05-07 01:59:41
      428Cross-site scripting / Security / OWASP / JavaScript / Application security / Document Object Model / XMLHttpRequest / Web storage / Eval / Computing / HTTP / Internet privacy

      DOM Xss Identification and Exploitation Stefano Di Paola CTO and Co-Founder Minded Security $ whoami

      Add to Reading List

      Source URL: media.hacking-lab.com

      Language: English - Date: 2011-05-19 11:20:47
      429Security / OWASP / QML / Nokia / Software / Computing / Qt

      OWASP GÖTEBORG SEPTEMBER 2012 HYBRID MOBILE APPS & THE EVOLVING WEB BY MIKKO SAARIO Twitter: @midisFI (http://twitter.com/midisfi)

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2012-09-13 15:22:58
      430Security / OWASP / Software testing / Web application security / Application security / Vulnerability / OWASP Mantra Security Framework / CCWAPSS / Computer security / Computer network security / Cyberwarfare

      Microsoft PowerPoint - owasp_cmh_080324_draft.ppt

      Add to Reading List

      Source URL: www.owasp.org

      Language: English - Date: 2011-12-11 14:43:52
      UPDATE