This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
All public logs
Combined display of all available logs of OWASP. You can narrow down the view by selecting a log type, the username (case-sensitive), or the affected page (also case-sensitive).
(newest | oldest) View (newer 50 | older 50) (20 | 50 | 100 | 250 | 500)- 15:43, 2 April 2010 Jsokol (talk | contribs) uploaded File:Reducing Your Data Security Risk Through Tokenization.pptx
- 20:47, 1 April 2010 Jsokol (talk | contribs) uploaded File:Enterprise Application Security Practices.ppt
- 20:09, 30 September 2009 Jsokol (talk | contribs) uploaded File:Austin Chapter OWASP ROI-mtesauro.pdf
- 19:52, 28 August 2009 Jsokol (talk | contribs) uploaded File:TM.pptx (Michael Howard's presentation on Threat Modeling.)
- 03:01, 29 April 2009 Jsokol (talk | contribs) uploaded File:OWASP - Architecting Secure Web Systems.pptx
- 13:14, 30 October 2008 Jsokol (talk | contribs) uploaded File:Using Proxies to secure applications and more.pptx (Presented by Josh Sokol at the Austin OWASP meeting on 10/28/2008. The last Austin OWASP presentation of the year is a must see for anyone responsible for the security of a web application. It is a demonstration of the various types of proxy software and)