OWASP

Results: 546



#Item
541Security / Software testing / Risk management / OWASP / Vulnerability / Application security / Risk / IT risk management / HP Application Security Center / Computer security / Cyberwarfare / Management

Web Application Security Assessment Policy John Hally [removed] Why This Policy?

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2012-08-21 07:55:31
542Computer network security / Software testing / Hacking / Vulnerability / Social vulnerability / Java / OWASP / Computer security / Computing / Cyberwarfare

WAS Core Developer For Outpost24 Outpost24, a world leading IT Security company within Vulnerability Management with local Sales Representatives/Partners in more than 30 countries and headquarters in Karlskrona/Sweden an

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2014-02-06 03:51:51
543Computer programming / Buffer overflow / OWASP / Morris worm / Code Red / C standard library / C / Buffer solution / Stack buffer overflow / Software bugs / Computing / Software engineering

Microsoft PowerPoint - 05-李建蒙.pptx

Add to Reading List

Source URL: www.owasp.org.cn

Language: English - Date: 2012-05-16 03:04:51
544Computer network security / Software testing / Application security / Electronic commerce / Cross-site scripting / Vulnerability / OWASP / Code injection / Penetration test / Computer security / Cyberwarfare / Security

PDF Document

Add to Reading List

Source URL: www.moital.gov.il

Language: English - Date: 2012-11-01 03:55:42
545Computer network security / Software testing / Security / OWASP / Cross-site scripting / Penetration test / Cross-site request forgery / Vulnerability / Web application security / Computer security / Cyberwarfare / Computing

PDF Document

Add to Reading List

Source URL: owasptop10.googlecode.com

Language: English
546Computer network security / Software testing / Cross-site scripting / Cross-site request forgery / OWASP / Vulnerability / Application security / Web application security / SQL injection / Computer security / Cyberwarfare / Computing

PDF Document

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2008-11-12 13:18:10
UPDATE