OWASP

Results: 546



#Item
521Computer security / Password / Internet of Things / Cloud computing / Home network / Internet / OWASP / Password manager / Wireless security / Computer network security / Computing / Security

Report Internet of Things Research Study Overview Suddenly, everything from refrigerators to sprinkler

Add to Reading List

Source URL: fortifyprotect.com

Language: English
522Computing / Internet / Data / Internet standards / Cryptographic software / Transport Layer Security / HTTP Secure / Cipher suite / Cryptography / Secure communication / Cryptographic protocols / Internet protocols

PDF Document

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-11-30 14:59:44
523Computer network security / Crime prevention / National security / OWASP / Web application security / Application security / Vulnerability / Cross-site scripting / Information security / Computer security / Cyberwarfare / Security

[removed][removed][removed]New York State Information Technology Standard No: NYS-S13-002

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
524Computer network security / Crime prevention / National security / OWASP / Web application security / Application security / Vulnerability / Cross-site scripting / Information security / Computer security / Cyberwarfare / Security

ANDREW M. CUOMO Governor State Capitol P.O. Box 2062 Albany, NY[removed]www.its.ny.gov

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-03-17 15:10:40
525Software quality / Computer security / Software testing / Software bugs / Application security / Coverity / Penetration test / Fortify Software / OWASP / Computer network security / Computing / Security

Software Security Touchpoint: Architectural Risk Analysis Gary McGraw, Ph.D. Chief Technology Officer, Cigital

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:59
526Computing / Application security / Web application security / OWASP / Vulnerability / Application architecture / Penetration test / Proxy server / Load balancing / Computer network security / Computer security / Cyberwarfare

Submitted for publication. Not for redistribution. Architecture-Based Self-Protecting Software Systems Eric Yuan, Sam Malek George Mason University 4400 University Drive

Add to Reading List

Source URL: acme.able.cs.cmu.edu

Language: English - Date: 2013-03-08 09:47:09
527Computer network security / Security / Web application security / Software testing / OWASP / HTTP response splitting / Application security / SQL injection / Cross-site scripting / Computer security / Cyberwarfare / Computing

OWASP to WASC to CWE Mapping Correlating Different Industry Taxonomy Jesper Jurcenoks Director, Research Chief Evangelist

Add to Reading List

Source URL: www.criticalwatch.com

Language: English - Date: 2013-07-10 13:17:08
528Computer network security / Crime prevention / National security / OWASP / Vulnerability / Cross-site scripting / Application security / Web application security / Information security / Security / Computer security / Cyberwarfare

Microsoft Word - Web Application Security Standard Operating Environment (SOE) V1.2

Add to Reading List

Source URL: cuit.columbia.edu

Language: English - Date: 2013-12-19 16:30:13
529Computer network security / Application firewall / Web application security / OWASP / Application security / Cross-site scripting / Denial-of-service attack / SQL injection / Vulnerability / Cyberwarfare / Computer security / Computing

Web Application Firewall Protect your website against SQL injections, cross-site scripting attacks and more CloudFlare’s Web Application Firewall (WAF) protects your website from SQL injection, cross-site scripting (X

Add to Reading List

Source URL: www.cloudflare.com

Language: English - Date: 2014-07-07 11:46:59
530Computer network security / Software testing / Hacking / OWASP / Application security / Southeast Community College / Vulnerability / Computer security / Security / Cyberwarfare

Conference: Tuesday, June 3, 2014 Venue: SCC Continuing Education Center 301 S. 68th St. Place Lincoln, NE 9th Annual

Add to Reading List

Source URL: www.cio.nebraska.gov

Language: English - Date: 2014-04-10 10:20:58
UPDATE