OWASP

Results: 546



#Item
461OWASP / Security

The OWASP Foundation http://www.owasp.org Microsoft SDL in practice Alex Thissen Principal Architect, Achmea

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: English - Date: 2015-02-01 14:38:24
462Security / Computer network security / Software testing / OWASP / Application security / Web application security / Vulnerability / Computer security / Cyberwarfare / Computing

WhiteHat Security Jim Manico – VP Security Architecture When is a web security assessment tool effective for your web application security program? Page 1

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
463Science / Computer security / Quality assurance / Software assurance / Application security / OWASP / Software security assurance / Copyright / Software development process / Software quality / Security / Public safety

Do You Have a Scanner! Or Do You Have a Scanning Program?! ! Dan Cornell! @danielcornell

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
464OWASP / Security / Software project management / Management / Project management / Agile Unified Process / Extreme programming / Software development process / Dynamic systems development method / Software development / Agile software development / Software

Microsoft PowerPoint - AppSec2006Seattle-AgileAndSecure.ppt [Read-Only]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:33
465Computer network security / Software testing / National security / Penetration test / Application security / Vulnerability / OWASP / Information security / Risk / Security / Computer security / Cyberwarfare

Application Security Report Application Security Report is an annual SYNTAX publication summarizing the

Add to Reading List

Source URL: syntax.gr

Language: English - Date: 2014-12-05 06:56:26
466

Sicherheit in und für Deutschland Isabel Münch Bundesamt für Sicherheit in der Informationstechnik Sicherheitsmanagement und IT-Grundschutz

Add to Reading List

Source URL: www.owasp.org

Language: German - Date: 2011-12-11 14:43:18
    467Security / OWASP / Software testing / Web application security / Application security / Vulnerability / Imperva / Computer network security / Computer security / Cyberwarfare

    Don’t Bring A Knife To A Gun Fight: The Hacker Intelligence Initiative Robert Rachwald

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:52
    468Computing / Computer network security / Rapid7 / Penetration test / Security / Application security / OWASP / Security testing / Web application security / Computer security / Software / Software testing

    Web Application Penetration Testing What is it? In addition to the Open Source Security Testing Methodology Manual (OSSTMM) and the Penetration Testing Execution Standard (PTES) Rapid7’s application penetration testing

    Add to Reading List

    Source URL: www.rapid7.com

    Language: English - Date: 2014-06-06 17:54:12
    469Computer network security / Cross-site scripting / Software testing / Cross-site request forgery / Hacking / OWASP / JavaScript / Application security / Vulnerability / Computer security / Cyberwarfare / Computing

    Application Security for Rich Internet Applications @johnwilander at Jfokus Feb[removed]Stockholm, Sweden

    Add to Reading List

    Source URL: www.jfokus.se

    Language: English - Date: 2012-09-20 14:56:56
    470Software bugs / Pointer / C / Vulnerability / Heap overflow / Application security / OWASP / Computing / Software engineering / Computer programming

    LeafSR_BlackHat_2014_Webcast

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2014-12-16 19:06:10
    UPDATE