Help
Category:AppSec DC 2010 Presentations
From OWASP
Jump to:
navigation
,
search
Listing of all AppSec DC Presentations
Pages in category "AppSec DC 2010 Presentations"
The following 55 pages are in this category, out of 55 total.
A
A new approach to preventing injection attacks on the Web Application Stack
Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
AppSec DC 2010 Keynote Neal Ziring
AppSec DC 2010 Keynote Ron Ross
Attack Detection and Prevention with OWASP AppSensor
B
Botnet Resistant Coding: Protecting Your Users from Script Kiddies
C
Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners
Cloudy with a chance of hack!
Code Reviewing Strategies
Constricting the Web: Offensive Python for Web Hackers
Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise
D
Dealing with Web Application Security, Regulation Style
Declarative Web Security
Deconstructing ColdFusion
Don't Judge a Website by its Icon - Read the Label!
Drive By Downloads: How To Avoid Getting A Cap Popped In Your App
E
Ensuring Software Assurance Process Maturity
Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files
F
Federal Perspectives on Application Security
Financial Services Panel
Framed! Security-patching Common Web Development Frameworks
Friendly Traitor 2 Features are hot but giving up our secrets is not!
G
GuardRails: A Nearly Painless Solution to Insecure Web Applications
H
H.....t.....t....p.......p....o....s....t
Hacking .NET Applications at Runtime: A Dynamic Attack
Hacking Oracle From Web Apps
Hacking SAP BusinessObjects
I
Implementing a Secure Software Development Program
J
JavaSnoop: How to hack anything written in Java
L
Lessons Learned from Process Implementation and Benchmarking
Life in the Clouds: a Service Provider's View
M
Measuring Security: 5 KPIs for Successful Web App Security Programs
Microsoft's Security Development Lifecycle for Agile Development
O
Open Source Web Entry Firewall
OWASP ESAPI SwingSet
OWASP ModSecurity Core Rule Set
P
Pen Testing with Iron
Pen-Test Panel
People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group
Protecting Federal Government from Web 2.0 Application Security Risks
Providing application-level assurance through DNSSEC
Python Basics for Web App Pentesters
S
Secure Code Review: Enterprise Metrics
Security Risk and the Software Supply Chain
Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications
Social Zombies Gone Wild: Totally Exposed and Uncensored
Solving Real World Problems with ESAPI
T
The Secure Coding Practices Quick Reference Guide
The Strengths of Combining Code Review with Application Penetration Testing
The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform
Threats from Economical Improvement
U
Understanding How They Attack Your Weaknesses: CAPEC
Unlocking the Toolkit: Attacking Google Web Toolkit
W
White and Black box testing of Lotus Domino Applications
WXf: Web Exploitation Framework
Category
:
OWASP AppSec DC 2010 Schedule
Navigation menu
Personal tools
Log in
Request account
Namespaces
Category
Discussion
Variants
Views
Read
View source
View history
More
Search
Navigation
Main page
Recent changes
Random page
Help
Tools
What links here
Related changes
Special pages
Printable version
Permanent link
Page information