This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecAsiaPac2012 Slides"
Sarah Baso (talk | contribs) (Created page with "[https://www.owasp.org/images/f/f8/AppsecAPAC2012-HTTP-fingerprinting-TNG HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen]") |
Sarah Baso (talk | contribs) m |
||
(20 intermediate revisions by 2 users not shown) | |||
Line 1: | Line 1: | ||
− | [ | + | Keynote: [[Media:OWASP_AsiaPac_04.14.pdf|Web Application Security: Connecting the Dots - Jeremiah Grossman]] |
+ | |||
+ | Keynote: [[Media:Ss_goes_mobile_(60m).pptx|Software Security Goes Mobile - Jacob West]] | ||
+ | |||
+ | Keynote: [[Media:APAC2012Whereweare..Wherearewegoing.pptx|OWASP Where we are ... Where we are going - Justin Clarke and Justin Searle]] | ||
+ | |||
+ | [[Media:AppsecAPAC2012-HTTP-fingerprinting-TNG.pdf|HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen]] | ||
+ | |||
+ | [https://s3.amazonaws.com/owaspasterisk/beef-appsecapac2012-v0.pdf Shake Hands with BeEF - Christian “@xntrik” Frichot] | ||
+ | |||
+ | [[Media:Secure_Coding_Practices_Quick_Ref.pdf|OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke]] | ||
+ | |||
+ | [[Media:OWASP_APPSEC_ASIAPAC_ZAP_2.pptx|OWASP Project: Zed Attack Proxy - Simon Bennets]] | ||
+ | |||
+ | [[Media:OWASP_Asia_AppSec_2012_Adrian_Hayes.pdf|Web Crypto for the Developer Who Has Better Things to Do - Adrian Hayes]] | ||
+ | |||
+ | [[Media:OWASP_Presentation_Pfreiberg_-_Shelde_-_Application_Security_Logging_-_The_Next_Frontier_-_13_April_2012.ppt| Application Security Logging - the Next Frontier - Peter Frieberg]] | ||
+ | |||
+ | [[Media:AppSecAPAC2012_Bruce_Ashton.odp|Effective Software Development in a PCI DSS Environment - Bruce Ashton]] | ||
+ | |||
+ | [[Media:OWASP_Advanced_Mobile_Application_Code_Review_Techniques.pptx|Advanced Mobile Application Code Review Techniques - Prashant Verma and Dinesh Shetty]] | ||
+ | |||
+ | [[Media:PLA_OWASP_APPSEC_APAC-2012_Conference_V1.2.9.pdf|Password Less Authentication - Srikar Sagi]] | ||
+ | |||
+ | [[Media:Presentation_Slides.pptx|Static Code Analysis and Governance - Jonathan Carter]] | ||
+ | |||
+ | [[Media:ASDC12-Pentesting_Smart_Grid_Web_Apps.pdf|Pentesting Smart Grid Apps - Justin Searle]] | ||
+ | |||
+ | [[Media:ASDC12-Anatomy_of_a_Logic_Flaw.pdf|Anatomy of a Logic Flaw - Charles Henderson & Daniel Crowley]] | ||
+ | |||
+ | [[Media:ASDC12-Overcoming_the_Quality_vs_Quantity_Problem_in_SoftwareSecurity_Testing.pdf|Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los]] | ||
+ | |||
+ | [[Media:ASDC12-Mobile_Application_Security_Who_how_and_why.pdf|Mobile Security on iOS and Android - Mike Park]] | ||
+ | |||
+ | [http://www.ruxcon.org.au/assets/Presentations/2011/LNLJ-Harder_Better_Faster_Stronger_V1.0.pdf Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger] | ||
+ | |||
+ | [[Media:Effective_Security_Education.odp|Effective Security Education and Related OWASP Projects - Sandeep Nain]] | ||
+ | |||
+ | [http://www.strongauth.com/images/pdf/rc3-may2012.pdf Rethinking Web Application Architecture for Cloud - Arshad Noor] | ||
+ | |||
+ | [[Media:OWASP_APPSEC_SYDNEY2012-Errazudin.pdf|Rise of the Planet Anonymous - Errazudin Ishak]] | ||
+ | |||
+ | [[Media:OWASP_SYD_GGaskell_1.pdf|The Risks that Pen Tests Don't Find - Gary Gaskell]] | ||
+ | |||
+ | [[Media:Pentesting_Mobile_Applications.pdf|Pentesting Mobile Applications - Tony Liu & Rainman Wu]] | ||
+ | |||
+ | [[Media:SlayingDragons-ccbysa30nz.pdf|How MITM Proxy has been slaying SSL Dragons - Jim Cheetham]] | ||
+ | |||
+ | [[Media:OWASP_defending-MITMA_APAC2012.pdf|Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom]] | ||
+ | |||
+ | [[Category:OWASP_Presentations]] |
Latest revision as of 13:27, 29 May 2012
Keynote: Web Application Security: Connecting the Dots - Jeremiah Grossman
Keynote: Software Security Goes Mobile - Jacob West
Keynote: OWASP Where we are ... Where we are going - Justin Clarke and Justin Searle
HTTP Fingerprinting - Eldar 'Wireghoul' Marcussen
Shake Hands with BeEF - Christian “@xntrik” Frichot
OWASP Project:Secure Coding Quick Reference Guide - Justin Clarke
OWASP Project: Zed Attack Proxy - Simon Bennets
Web Crypto for the Developer Who Has Better Things to Do - Adrian Hayes
Application Security Logging - the Next Frontier - Peter Frieberg
Effective Software Development in a PCI DSS Environment - Bruce Ashton
Advanced Mobile Application Code Review Techniques - Prashant Verma and Dinesh Shetty
Password Less Authentication - Srikar Sagi
Static Code Analysis and Governance - Jonathan Carter
Pentesting Smart Grid Apps - Justin Searle
Anatomy of a Logic Flaw - Charles Henderson & Daniel Crowley
Overcoming the Quality vs. Quantity Problem in Software Security Testing - Raf Los
Mobile Security on iOS and Android - Mike Park
Harder Better Faster Stronger (SQLi) Luke Jahnke and Louis Nyffenegger
Effective Security Education and Related OWASP Projects - Sandeep Nain
Rethinking Web Application Architecture for Cloud - Arshad Noor
Rise of the Planet Anonymous - Errazudin Ishak
The Risks that Pen Tests Don't Find - Gary Gaskell
Pentesting Mobile Applications - Tony Liu & Rainman Wu
How MITM Proxy has been slaying SSL Dragons - Jim Cheetham
Securing the SSL/TLS channel against man-in-the-middle attacks - Tobias Gondrom