OWASP

Results: 546



#Item
511Computing / Computer security / Computer network security / Crime prevention / National security / OWASP / Software quality / Payment Card Industry Data Security Standard / Open source software security / Electronic commerce / Coverity / Security

DATA SHEET Coverity Policy Manager Coverity® Policy Manager helps you drive the adoption of development testing across your organization and provides the visibility, traceability and predictability you need to make bet

Add to Reading List

Source URL: webstaging.coverity.com

Language: English - Date: 2014-01-03 11:15:02
512Computer network security / Cross-site scripting / Penetration test / OWASP / Vulnerability / Cross-site request forgery / HTTP cookie / Computer security / Cyberwarfare / Software testing

Feeling insecure about your web testing? Who is being hacked?

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:48
513Computer network security / OWASP / Improper input validation / Cross-site scripting / SQL injection / Password / Code injection / Uncontrolled format string / Authorization / Computer security / Cyberwarfare / Security

[removed]Improper Null Termination 248 -

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
514Computer network security / Security / Software testing / OWASP / Cross-site request forgery / Cross-site scripting / SQL injection / Password / Code injection / Computer security / Cyberwarfare / Computing

938 - OWASP Top Ten 2013 Category A10 - Unvalidated Redirects and Forwards[removed]OWASP Top Ten 2013 Category A9 - Using Components with Known Vulnerabilities

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
515Security / Cryptography / Rootkits / Backdoor / Malware / Spyware / OWASP / Vulnerability / Computer security / Cyberwarfare / Espionage

OWASP Top Ten Backdoors Yaniv Simsolo, COMSEC Consulting 1

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:59
516Computer network security / Software testing / Hacking / OWASP / Application security / Southeast Community College / Vulnerability / Computer security / Security / Cyberwarfare

Conference: Tuesday, June 3, 2014 Venue: SCC Continuing Education Center 301 S. 68th St. Place Lincoln, NE 9th Annual

Add to Reading List

Source URL: cio.nebraska.gov

Language: English - Date: 2014-04-10 10:20:58
517Security / OWASP / Cross-site request forgery / Cross-site scripting / SQL injection / Authentication / Lightweight Directory Access Protocol / Code injection / Computer security / Cyberwarfare / Computing

[removed]OWASP Top Ten 2007 Category A10 - Failure to Restrict URL Access

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2014-07-31 15:32:17
518Crime prevention / National security / Computer network security / Vulnerability / Information security / OWASP / Cross-site scripting / Web application security scanner / Penetration test / Computer security / Security / Cyberwarfare

Level 3 – Public Page 1 of 3 Information Technology Application Development Standard

Add to Reading List

Source URL: www.csun.edu

Language: English - Date: 2012-10-11 13:25:14
519Computer network security / Crime prevention / National security / OWASP / Vulnerability / Cross-site scripting / Application security / Web application security / Information security / Security / Computer security / Cyberwarfare

Web Application Security Standards and Practices Columbia University Web Application Security Standards and Practices Objective and Scope

Add to Reading List

Source URL: cuit.columbia.edu

Language: English - Date: 2013-01-02 14:30:06
520Computer network security / Software testing / Web application security / Hacking / OWASP / CWE / Vulnerability / Secure coding / SANS Institute / Computer security / Cyberwarfare / Computing

Investigating SANS/CWE Top 25 Programming Errors. 1 Running Title: Investigating SANS/CWE Top 25 Programming Errors. Investigating the SANS/CWE Top 25 Most Dangerous Programming Errors List Fred Williams

Add to Reading List

Source URL: www.infosecwriters.com

Language: English - Date: 2009-04-20 21:59:29
UPDATE