Web application security

Results: 759



#Item
481Computer network security / Software testing / Secure communication / National security / Web application security / Password / Penetration test / Cross-site scripting / HTTP Secure / Computer security / Security / Cyberwarfare

Securing Web Application Technologies (SWAT) C h e c k l i s t The SWAT Checklist provides an easy-to-reference set of best practices that raise awareness and help development teams create more secure applications. It’

Add to Reading List

Source URL: www.securingthehuman.org

Language: English - Date: 2015-01-28 15:57:38
482Cryptographic protocols / Secure communication / Network architecture / Internet protocols / Computer network security / Cyberoam / Application firewall / Reverse proxy / World Wide Web / Computing / Internet / HTTP

Web Application Firewall Subscription on Cyberoam UTM appliances Protecting Web Applications from hackers ation Applic Control

Add to Reading List

Source URL: www.systemec.nl

Language: English - Date: 2013-05-24 17:14:35
483Computer network security / Cross-site scripting / Aggregate / OWASP / Vulnerability / Motorways of Switzerland / Web application security / ISO 216 / Cross-site request forgery / Computer security / Cyberwarfare / Software testing

Transforming IT Security & Compliance A Decade of Web Application Security What have we learned? Jason Kent, Director Web Application Security

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2013-11-08 16:14:21
484Computing / OWASP / Web application security / Application firewall / Application security / ModSecurity / Vulnerability / Hacker / Threat / Computer network security / Cyberwarfare / Computer security

Web Hacking Incidents Revealed - Trends, Stats and How to Defend

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
485

Security at scale: Web application security in a continuous deployment environment [removed] @zanelackey

Add to Reading List

Source URL: software-security.sans.org

- Date: 2012-08-27 18:45:03
    486Computer network security / Software testing / Global Information Assurance Certification / Application security / Web application security / Vulnerability / Fortify Software / Software engineering / OWASP / Computer security / Computing / Cyberwarfare

    SANS Announces First Secure Coding Certification Exams and Certification for Programmers

    Add to Reading List

    Source URL: software-security.sans.org

    Language: English - Date: 2012-08-27 18:45:04
    487Security / Computer network security / Software testing / OWASP / Application security / Web application security / Vulnerability / Computer security / Cyberwarfare / Computing

    WhiteHat Security Jim Manico – VP Security Architecture When is a web security assessment tool effective for your web application security program? Page 1

    Add to Reading List

    Source URL: software-security.sans.org

    Language: English - Date: 2012-08-27 12:08:52
    488Software testing / Hacking / Vulnerability / Database / Data validation / JavaScript / Information security audit / Software security assurance / Cyberwarfare / Computing / Computer security

    Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation

    Add to Reading List

    Source URL: www.sans.edu

    Language: English - Date: 2012-08-27 12:08:53
    489Computer network security / Software testing / Web applications / Global Information Assurance Certification / Hacking / Web application security / Penetration test / Application security / Secure coding / Computing / Computer security / Cyberwarfare

    PDF Document

    Add to Reading List

    Source URL: software-security.sans.org

    Language: English - Date: 2012-08-27 12:08:53
    490Computer network security / Software bugs / Software testing / Hacking / Code injection / Vulnerability / Web application security / Password / Pointer / Cyberwarfare / Computer security / Computing

    Highest Priority Cyber Security Risks Presents See www.sans.org/top-cyber-security-risks to view entire report

    Add to Reading List

    Source URL: software-security.sans.org

    Language: English - Date: 2012-08-27 18:45:04
    UPDATE