This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecAsiaPac2012 Slides"
Sarah Baso (talk | contribs) |
Sarah Baso (talk | contribs) m |
||
(5 intermediate revisions by 2 users not shown) | |||
Line 34: | Line 34: | ||
[http://www.ruxcon.org.au/assets/Presentations/2011/LNLJ-Harder_Better_Faster_Stronger_V1.0.pdf Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger] | [http://www.ruxcon.org.au/assets/Presentations/2011/LNLJ-Harder_Better_Faster_Stronger_V1.0.pdf Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger] | ||
+ | |||
+ | [[Media:Effective_Security_Education.odp|Effective Security Education and Related OWASP Projects - Sandeep Nain]] | ||
[http://www.strongauth.com/images/pdf/rc3-may2012.pdf Rethinking Web Application Architecture for Cloud - Arshad Noor] | [http://www.strongauth.com/images/pdf/rc3-may2012.pdf Rethinking Web Application Architecture for Cloud - Arshad Noor] | ||
Line 42: | Line 44: | ||
[[Media:Pentesting_Mobile_Applications.pdf|Pentesting Mobile Applications - Tony Liu & Rainman Wu]] | [[Media:Pentesting_Mobile_Applications.pdf|Pentesting Mobile Applications - Tony Liu & Rainman Wu]] | ||
+ | |||
+ | [[Media:SlayingDragons-ccbysa30nz.pdf|How MITM Proxy has been slaying SSL Dragons - Jim Cheetham]] | ||
+ | |||
+ | [[Media:OWASP_defending-MITMA_APAC2012.pdf|Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom]] | ||
+ | |||
[[Category:OWASP_Presentations]] | [[Category:OWASP_Presentations]] |
Latest revision as of 13:27, 29 May 2012
Keynote: Web Application Security: Connecting the Dots - Jeremiah Grossman
Keynote: Software Security Goes Mobile - Jacob West
Keynote: OWASP Where we are ... Where we are going - Justin Clarke and Justin Searle
HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen
Shake Hands with BeEF - Christian “@xntrik” Frichot
OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke
OWASP Project: Zed Attack Proxy - Simon Bennets
Web Crypto for the Developer Who Has Better Things to Do - Adrian Hayes
Application Security Logging - the Next Frontier - Peter Frieberg
Effective Software Development in a PCI DSS Environment - Bruce Ashton
Advanced Mobile Application Code Review Techniques - Prashant Verma and Dinesh Shetty
Password Less Authentication - Srikar Sagi
Static Code Analysis and Governance - Jonathan Carter
Pentesting Smart Grid Apps - Justin Searle
Anatomy of a Logic Flaw - Charles Henderson & Daniel Crowley
Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los
Mobile Security on iOS and Android - Mike Park
Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger
Effective Security Education and Related OWASP Projects - Sandeep Nain
Rethinking Web Application Architecture for Cloud - Arshad Noor
Rise of the Planet Anonymous - Errazudin Ishak
The Risks that Pen Tests Don't Find - Gary Gaskell
Pentesting Mobile Applications - Tony Liu & Rainman Wu
How MITM Proxy has been slaying SSL Dragons - Jim Cheetham
Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom