This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
File:468x60-banner-2010.gif
From OWASP
468x60-banner-2010.gif (468 × 60 pixels, file size: 7 KB, MIME type: image/gif)
AppSec DC 2010 Banner
File history
Click on a date/time to view the file as it appeared at that time.
Date/Time | Thumbnail | Dimensions | User | Comment | |
---|---|---|---|---|---|
current | 17:57, 12 September 2010 | 468 × 60 (7 KB) | Mark.bristow (talk | contribs) | AppSec DC 2010 Banner |
- You cannot overwrite this file.
File usage
The following 73 pages link to this file:
- A new approach to preventing injection attacks on the Web Application Stack
- AppSec DC 2010 Keynote Neal Ziring
- AppSec DC 2010 Keynote Ron Ross
- Application Portfolio Risk Ranking: Banishing FUD With Structure and Numbers
- Assessing and Exploiting Web Applications with Samurai-WTF
- Attack Detection and Prevention with OWASP AppSensor
- Botnet Resistant Coding: Protecting Your Users from Script Kiddies
- Closing the Gap: Analyzing the Limitations of Web Application Vulnerability Scanners
- Cloudy with a chance of hack!
- Code Reviewing Strategies
- Constricting the Web: Offensive Python for Web Hackers
- Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise
- Dealing with Web Application Security, Regulation Style
- Declarative Web Security
- Deconstructing ColdFusion
- Don't Judge a Website by its Icon - Read the Label!
- Drive By Downloads: How To Avoid Getting A Cap Popped In Your App
- Ensuring Software Assurance Process Maturity
- Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files
- Federal Perspectives on Application Security
- Financial Services Panel
- Framed! Security-patching Common Web Development Frameworks
- Friendly Traitor 2 Features are hot but giving up our secrets is not!
- GuardRails: A Nearly Painless Solution to Insecure Web Applications
- H.....t.....t....p.......p....o....s....t
- Hacking .NET Applications at Runtime: A Dynamic Attack
- Hacking Oracle From Web Apps
- Hacking SAP BusinessObjects
- Implementing a Secure Software Development Program
- JavaSnoop: How to hack anything written in Java
- Java Security Overview
- Leading an AppSec Initiative
- Leading the AppSec Initative
- Lessons Learned from Process Implementation and Benchmarking
- Life in the Clouds: a Service Provider's View
- MRB Scratchpad
- Measuring Security: 5 KPIs for Successful Web App Security Programs
- Microsoft's Security Development Lifecycle for Agile Development
- OWASP AppSec DC 2010
- OWASP AppSec DC 2010 Schedule
- OWASP Broken Web Applications Project Update
- OWASP ESAPI SwingSet
- OWASP ModSecurity Core Rule Set
- Open Source Web Entry Firewall
- Pen-Test Panel
- Pen Testing with Iron
- People, Process, and Technology: OWASP Impact on the SwA Processes and Practices Working Group
- Practical Web Security Overview
- Protecting Federal Government from Web 2.0 Application Security Risks
- Providing application-level assurance through DNSSEC
- Python Basics for Web App Pentesters
- Remote Testing for Common Web Application Security Threats
- Secure Code Review: Enterprise Metrics
- Security Risk and the Software Supply Chain
- Smart Phones with Dumb Apps: Threat Modeling for Mobile Applications
- Smashing WebGoat for Fun and Research: Static Code Scanner Evaluation
- Social Zombies Gone Wild: Totally Exposed and Uncensored
- Software Security Best Practices
- Software Security Remediation: How to Fix Application Vulnerabilities
- Solving Real World Problems with ESAPI
- The Art of Exploiting SQL Injections
- The Secure Coding Practices Quick Reference Guide
- The Strengths of Combining Code Review with Application Penetration Testing
- The Unintended Consequences of Beating Users with Carrot Sticks: Radical Thoughts on Security Reform
- The Web Hacking Incident Database (WHID) Report
- Threat Modeling Express
- Threats from Economical Improvement
- Understanding How They Attack Your Weaknesses: CAPEC
- Unlocking the Toolkit: Attacking Google Web Toolkit
- Using Misuse Cases to Articulate Vulnerabilities to Stakeholders
- WXf: Web Exploitation Framework
- WebAppSec.php: Developing Secure Web Applications
- White and Black box testing of Lotus Domino Applications