This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "AppSecUSA 2012.com"
From OWASP
| Line 1: | Line 1: | ||
*AppSecUSA Presentations and Talks | *AppSecUSA Presentations and Talks | ||
| + | |||
| + | ==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ==== | ||
| + | *10:00 am - 10:45 am | Developer | '''John Benninghoff''' | ||
| + | |||
| + | ==== Mobile Applications & Proxy Shenanigans ==== | ||
| + | *10:00 am - 10:45 am | Mobile | '''Dan Amodio''' | ||
| + | |||
| + | ==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ==== | ||
| + | *10:00 am - 10:45 am | Reverse Engineering | '''Alejandro Caceres''' | ||
| + | |||
| + | ==== Gauntlt: Rugged by Example ==== | ||
| + | *10:00 am - 10:45 am | Rugged devops | '''Jeremiah Shirk''' | ||
| − | |||
| − | |||
| − | |||
| − | |||
<br> | <br> | ||
Revision as of 06:00, 12 November 2012
- AppSecUSA Presentations and Talks
Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements
- 10:00 am - 10:45 am | Developer | John Benninghoff
Mobile Applications & Proxy Shenanigans
- 10:00 am - 10:45 am | Mobile | Dan Amodio
Reverse Engineering “Secure” HTTP APIs With An SSL Proxy
- 10:00 am - 10:45 am | Reverse Engineering | Alejandro Caceres
Gauntlt: Rugged by Example
- 10:00 am - 10:45 am | Rugged devops | Jeremiah Shirk