This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Category:OWASP AppSec DC 09
From OWASP
Pages in category "OWASP AppSec DC 09"
The following 69 pages are in this category, out of 69 total.
A
- Advanced SQL Injection
- Advanced SSL: The good, the bad, and the ugly
- Anatomy of a Logic Flaw: Breaking the Myth
- Application security metrics from the organization on down to the vulnerabilities
- AppSecDC Keynote Jarzomnek
- AppSecDC OWASP O2 PLATFORM
- AppSecDC09 Federal CISO Panel
- Attacking WCF Web Services
- Automated vs. Manual Security: You can't filter The Stupid
B
C
D
- Defend Yourself: Integrating Real Time Defenses into Online Applications
- Deploying Secure Web Applications with OWASP Resources
- Detecting, correcting and preventing defects through a holistic AppSec program
- Development Issues Within AJAX Applications: How to Divert Threats
- DISA's Application Security and Development STIG: How OWASP Can Help You
F
I
M
O
S
- SANS Dshield Webhoneypot Project
- Scalable Application Assessments in the Enterprise
- SCAP: Automating our way out of the Vulnerability Wheel of Pain
- SDLC Panel AppSecDC
- Secure SDLC: The Good, The Bad, and The Ugly
- Secure Software Updates: Update Like Conficker
- Securing the Core JEE Patterns
- Social Zombies: Your Friends Want to Eat Your Brains
- Software Development The Next Security Frontier
- Summit 2009
- Synergy! A world where the tools communicate
T
- Techniques in Attacking and Defending XML/Web Services
- The 10 least-likely and most dangerous people on the Internet
- The Big Picture: Web Risks and Assessments Beyond Scanning
- The Case of Promiscuous Parameters and Other Ongoing Capers in Web Security
- The Entrepreneur's Guide to Career Management
- The ESAPI Web Application Firewall (ESAPI WAF)
- The essential role of infosec in secure software development
- The OWASP Security Spending Benchmarks Project
- The Web Hacking Incidents Database
- Threat Modeling by John Steven
- Transparent Proxy Abuse
U
W
- Web Application Security Scanner Evaluation Criteria
- When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and
- When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and "Highly Interactive" Technologies
- When Web 2.0 Attacks - Understanding Security Implications of AJAX, Flash and Highly Interactive Technologies