This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecAsiaPac2012 Slides"
Sarah Baso (talk | contribs) |
Sarah Baso (talk | contribs) m |
||
(11 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
+ | Keynote: [[Media:OWASP_AsiaPac_04.14.pdf|Web Application Security: Connecting the Dots - Jeremiah Grossman]] | ||
+ | |||
Keynote: [[Media:Ss_goes_mobile_(60m).pptx|Software Security Goes Mobile - Jacob West]] | Keynote: [[Media:Ss_goes_mobile_(60m).pptx|Software Security Goes Mobile - Jacob West]] | ||
Line 5: | Line 7: | ||
[[Media:AppsecAPAC2012-HTTP-fingerprinting-TNG.pdf|HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen]] | [[Media:AppsecAPAC2012-HTTP-fingerprinting-TNG.pdf|HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen]] | ||
− | [https://s3.amazonaws.com/owaspasterisk/beef-appsecapac2012-v0.pdf Shake Hands with BeEF Christian “@xntrik” Frichot] | + | [https://s3.amazonaws.com/owaspasterisk/beef-appsecapac2012-v0.pdf Shake Hands with BeEF - Christian “@xntrik” Frichot] |
[[Media:Secure_Coding_Practices_Quick_Ref.pdf|OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke]] | [[Media:Secure_Coding_Practices_Quick_Ref.pdf|OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke]] | ||
Line 30: | Line 32: | ||
[[Media:ASDC12-Mobile_Application_Security_Who_how_and_why.pdf|Mobile Security on iOS and Android - Mike Park]] | [[Media:ASDC12-Mobile_Application_Security_Who_how_and_why.pdf|Mobile Security on iOS and Android - Mike Park]] | ||
+ | |||
+ | [http://www.ruxcon.org.au/assets/Presentations/2011/LNLJ-Harder_Better_Faster_Stronger_V1.0.pdf Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger] | ||
+ | |||
+ | [[Media:Effective_Security_Education.odp|Effective Security Education and Related OWASP Projects - Sandeep Nain]] | ||
+ | |||
+ | [http://www.strongauth.com/images/pdf/rc3-may2012.pdf Rethinking Web Application Architecture for Cloud - Arshad Noor] | ||
+ | |||
+ | [[Media:OWASP_APPSEC_SYDNEY2012-Errazudin.pdf|Rise of the Planet Anonymous - Errazudin Ishak]] | ||
+ | |||
+ | [[Media:OWASP_SYD_GGaskell_1.pdf|The Risks that Pen Tests Don't Find - Gary Gaskell]] | ||
+ | |||
+ | [[Media:Pentesting_Mobile_Applications.pdf|Pentesting Mobile Applications - Tony Liu & Rainman Wu]] | ||
+ | |||
+ | [[Media:SlayingDragons-ccbysa30nz.pdf|How MITM Proxy has been slaying SSL Dragons - Jim Cheetham]] | ||
+ | |||
+ | [[Media:OWASP_defending-MITMA_APAC2012.pdf|Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom]] | ||
[[Category:OWASP_Presentations]] | [[Category:OWASP_Presentations]] |
Latest revision as of 13:27, 29 May 2012
Keynote: Web Application Security: Connecting the Dots - Jeremiah Grossman
Keynote: Software Security Goes Mobile - Jacob West
Keynote: OWASP Where we are ... Where we are going - Justin Clarke and Justin Searle
HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen
Shake Hands with BeEF - Christian “@xntrik” Frichot
OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke
OWASP Project: Zed Attack Proxy - Simon Bennets
Web Crypto for the Developer Who Has Better Things to Do - Adrian Hayes
Application Security Logging - the Next Frontier - Peter Frieberg
Effective Software Development in a PCI DSS Environment - Bruce Ashton
Advanced Mobile Application Code Review Techniques - Prashant Verma and Dinesh Shetty
Password Less Authentication - Srikar Sagi
Static Code Analysis and Governance - Jonathan Carter
Pentesting Smart Grid Apps - Justin Searle
Anatomy of a Logic Flaw - Charles Henderson & Daniel Crowley
Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los
Mobile Security on iOS and Android - Mike Park
Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger
Effective Security Education and Related OWASP Projects - Sandeep Nain
Rethinking Web Application Architecture for Cloud - Arshad Noor
Rise of the Planet Anonymous - Errazudin Ishak
The Risks that Pen Tests Don't Find - Gary Gaskell
Pentesting Mobile Applications - Tony Liu & Rainman Wu
How MITM Proxy has been slaying SSL Dragons - Jim Cheetham
Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom