OWASP

Results: 546



#Item
481JavaScript / OWASP / Ajax / HTML / JSON / Cross-site scripting / Computing / Markup languages / Cross-platform software

Future of XSS Defense Jim Manico VP of Security Architecture [removed]

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
482Radio Aurora Explorer / Computer network security / Software testing / Spacecraft / OWASP / Security

Software Fault Interactions

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2014-12-23 13:34:04
483Human rights / Software testing / Computer network security / Electronic commerce / OWASP / Internet privacy / Privacy / Vulnerability / Application security / Computer security / Security / Cyberwarfare

Top 10 Privacy Risks Project Initial results presentation @ IPEN Workshop Florian Stahl (Project Lead, msg systems, Munich) Stefan Burgmair (Master Student, Univ. of Applied Sciences Munich) 26 September 2014, Berlin St

Add to Reading List

Source URL: secure.edps.europa.eu

Language: English - Date: 2014-10-31 10:46:01
484

OWASP Night 13th OWASP ZAP 2014 ReleaseNotes[removed] 亀田 勇歩 @YuhoKameda

Add to Reading List

Source URL: speakerd.s3.amazonaws.com

Language: Japanese - Date: 2014-09-09 09:17:54
    485Computer security / European Data Protection Supervisor / Internet privacy / Information privacy / Password / OWASP / Data breach / HTTP cookie / World Wide Web / Privacy / Ethics / Computing

    IPEN - The Internet Privacy Engineering Network Workshop: Engineering Privacy into Internet Services and Applications Date: Friday, 26 September 2014

    Add to Reading List

    Source URL: secure.edps.europa.eu

    Language: English - Date: 2014-09-10 06:48:11
    486Cyberwarfare / Computing / OWASP / Security / Penetration test / Application security / Web application security / Acceptance testing / Unit testing / Software testing / Computer network security / Computer security

    1 Testing Guide 4.0 Project Leaders: Matteo Meucci and Andrew Muller Creative Commons (CC) Attribution Share-Alike

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2014-09-24 14:12:01
    487Security / OWASP / XLA / Cross-site request forgery / Threat / DA-Notice / Computing / Computer security / Cyberwarfare / Computer network security

    XLA − Xtract Presentation, December 18, 2014  Confidential and Proprietary Excellence Always. Introduction 1. Automation needed to handle EINSTEIN (E3A) notices:

    Add to Reading List

    Source URL: csrc.nist.gov

    Language: English - Date: 2014-12-23 17:04:43
    488

    PDF Document

    Add to Reading List

    Source URL: www.owasp.org

    Language: German - Date: 2014-12-10 07:56:06
      489

      I Inhaltsverzeichnis Inhaltsverzeichnis O: Über OWASP

      Add to Reading List

      Source URL: www.owasp.org

      Language: German - Date: 2014-12-10 09:02:02
        490Computing / Web hosting service / Shared web hosting service / Virtual hosting / Dedicated hosting service / Client–server model / Session poisoning / HTTP Secure / Ident / Web hosting / World Wide Web / Internet

        Abusing Locality in Shared Web Hosting Nick Nikiforakis Nick Nikiforakis – OWASP – July 6th 2011 About me

        Add to Reading List

        Source URL: www.securitee.org

        Language: English - Date: 2013-01-01 13:05:36
        UPDATE