Web application security

Results: 759



#Item
431JavaServer Faces / Java specification requests / Java platform / Apache MyFaces / Java Platform /  Enterprise Edition / ASP.NET / Java Servlet / Padding oracle attack / Jspx-bay / Computing / Web application frameworks / Java enterprise platform

Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
432OWASP / Computing / Cyberwarfare / Computer network security / Form / User interface / User interface techniques / Security / Computer security

Manipulating Web Application Interfaces – a New Approach to Input Validation Testing Felipe Moreno-Strauch

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:40
433OWASP / Cyberwarfare / Application security / Web application security / OWASP Mantra Security Framework / Computer network security / Security / Computer security

-[removed]The OWASP Application Security Code of Conduct for Educational Institutions

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:20:20
434Security / OWASP / Software testing / Web application security / Application security / Vulnerability / Computer security / Computer network security / Cyberwarfare

OWASP GERMAN DAY[removed]Jim Manico [removed] Global Board Member Jerry Hoff

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-29 17:42:22
435Computer network security / Software testing / SQL / Data management / SQL injection / Web application security / Code injection / Penetration test / OWASP / Computer security / Cyberwarfare / Computing

One Click Ownage, Adventures of a lazy pen tester... Ferruh Mavituna Lead developer of netsparker

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:29
436Network management / Routing / Firewall / System software / Information technology management / Armorlogic / Application firewall / Computer network security / Computing / Load balancing

SteelApp Traffic Manager on AWS Licensing Guide SteelApp Traffic Manager and SteelApp Web App Firewall on AWS Feature Guide SteelApp Traffic Manager is a fully featured Layer-7 Application Controller, but there may be o

Add to Reading List

Source URL: media-cms.riverbed.com

Language: English - Date: 2014-08-15 09:33:40
437Computing / Software testing / Security / Application security / Penetration test / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

Jumpstart a Web Application Secure Coding Program: A Five Step Process SANS STI Application Security Written Assignment Author:  Jim  Beechey,  [removed]   Advisor:  Johannes  Ulrich  

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:59:40
438Cyberwarfare / Global Information Assurance Certification / Software testing / SANS Institute / Web application security / Programmer / Software engineering / Application security / Vulnerability / Computer security / Computing / Computer network security

SANS Institute was established in 1989 as a cooperative research and education organization. Today, SANS is the most trusted and largest source for information security training and certification in the world. SANS teach

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:04
439Cyberwarfare / Application firewall / Snort / Security appliance / Network security / Application security / Web application security scanner / Vulnerability / Firewall / Computer network security / Computing / Computer security

Data Sheet Cisco and NT OBJECTives Product Overview Cisco® Next-Generation IPS (NGIPS, or Snort) offers immediate protection against web application vulnerabilities by using Snort rules automatically generated by the N

Add to Reading List

Source URL: www.cisco.com

Language: English
440Hacking / Vulnerability / Failure / Computer security / Cyberwarfare / Software testing

From: Trustwave Advisories Sent: Tuesday, February 9th[removed]:41 ...SpiderLabs has documented view state tampering vulnerabilities ... View states are used by some web application frameworks to store the state of HTML

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:29
UPDATE