<--- Back to Details
First PageDocument Content
SQL injection / Computing / Data / Information / Security / OWASP / Cross-site request forgery
Date: 2011-12-11 14:42:25
SQL injection
Computing
Data
Information
Security
OWASP
Cross-site request forgery

Agile and Secure Can we do both? OWASP Jerry Hoff

Add to Reading List

Source URL: www.owasp.org

Download Document from Source Website

File Size: 1,42 MB

Share Document on Facebook

Similar Documents