OWASP

Results: 546



#Item
41Data security / Computing / Computer security / Prevention / Computer network security / OWASP / Information security / Information Systems Security Association / Issa

Capitol of Texas ISSA Chapter - Meeting Minutes September 17, :30 AM – 1:00 PM

Add to Reading List

Source URL: www.austinissa.org

Language: English - Date: 2014-11-17 14:28:20
42Computer security / Computer network security / Cyberwarfare / Software testing / Computing / OWASP / Application security / Penetration test / Vulnerability

Microsoft PowerPoint - ApplicationAssessmentTechniques_OWASPNoVa_20090806.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:33
43Computing / Computer security / Cyberwarfare / Cryptographic protocols / Secure communication / Computer network security / Internet protocols / Computer access control / Cross-site scripting / Cheat sheet / Cross-site request forgery / Cheating in video games

OWASP Cheat Sheets Martin Woschek, April 9, 2015 Contents I

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2015-04-23 16:03:46
44Computer security / Computer network security / Cyberwarfare / Computing / Software testing / OWASP / Application security / Vulnerability / Penetration test / Legacy system / Web application security / HP Application Security Center

Microsoft PowerPoint - SecuringAndModernizingApplicationsForTexasStateAgencies_Content.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:42
45Computing / Computer security / Cyberwarfare / Hacking / Computer network security / Software testing / Vulnerability / OWASP / Secure coding / Application security / Cross-site scripting / Defensive programming

Combating the Top 4 Sources of Software Vulnerabilities

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-07-20 15:52:45
46Computer network security / OWASP / Vulnerability / Application security

Vulnerability Management in an Application Security World AppSec DC November 12th, 2009

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:53
47Agile software development / Computer network security / Software project management / OWASP / Software development process / Dynamic systems development method / Extreme programming / Agile Unified Process / Unified Process / Agile

Microsoft PowerPoint - OWASPAppSec2006Seattle_AgileAndSecure.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:06
48Computer security / Computer network security / Hacking / Software testing / Vulnerability / OWASP / Cross-site scripting / Software quality / Application security / Software / Security / HDIV

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:45
49Computer network security / OWASP / Cross-site request forgery / Patch

AuthMatrix   Simplified  Authoriza2on  Tes2ng  for   Web  Applica2ons     About  Me  –  Mick  Ayzenberg  

Add to Reading List

Source URL: schd.ws

Language: English - Date: 2016-02-01 23:22:56
50Computer network security / Hacking / Computer security / Web applications / Web application security / SQL injection / Vulnerability / Cross-site scripting / Application security / OWASP / HDIV / Web application firewall

Microsoft PowerPoint - DenimGroup_TurningThe Battleship_HowToBuildSecureSoftwareInLargeOrganizations_Content.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:31
UPDATE