This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org

Difference between revisions of "AppSecUSA 2012.com"

From OWASP
Jump to: navigation, search
Line 1: Line 1:
 
*AppSecUSA Presentations and Talks
 
*AppSecUSA Presentations and Talks
 +
 +
==== Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements ====
 +
*10:00 am - 10:45 am | Developer | '''John Benninghoff'''
 +
 +
==== Mobile Applications & Proxy Shenanigans ====
 +
*10:00 am - 10:45 am | Mobile | '''Dan Amodio'''
 +
 +
==== Reverse Engineering “Secure” HTTP APIs With An SSL Proxy ====
 +
*10:00 am - 10:45 am | Reverse Engineering | '''Alejandro Caceres'''
 +
 +
==== Gauntlt: Rugged by Example ====
 +
*10:00 am - 10:45 am | Rugged devops | '''Jeremiah Shirk'''
  
{|style="vertical-align:top;width:90%;background-color:#white;padding:10px;border:1px solid silver;" align="center" cellspacing="5"
 
|-
 
| align="center" height="30" style="background:#CCCCEE;" colspan="2"      | '''Tracks'''
 
|-
 
 
   
 
   
 
<br>
 
<br>

Revision as of 06:00, 12 November 2012

  • AppSecUSA Presentations and Talks

Building Predictable Systems using Behavioral Security Modeling: |Functional Security Requirements

  • 10:00 am - 10:45 am | Developer | John Benninghoff

Mobile Applications & Proxy Shenanigans

  • 10:00 am - 10:45 am | Mobile | Dan Amodio

Reverse Engineering “Secure” HTTP APIs With An SSL Proxy

  • 10:00 am - 10:45 am | Reverse Engineering | Alejandro Caceres

Gauntlt: Rugged by Example

  • 10:00 am - 10:45 am | Rugged devops | Jeremiah Shirk