This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Difference between revisions of "OWASP AppSec DC 2012/Schedule/4-4-2012"
From OWASP
Dallendoug (talk | contribs) (fixed date issue.) |
Mark.bristow (talk | contribs) |
||
Line 63: | Line 63: | ||
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/OWASP_Broken_Web_Applications_OWASP_BWA_10_Release OWASP Broken Web Applications (OWASP BWA) 1.0 Release]<br><br> | ||
Chuck Willis | Chuck Willis | ||
− | | align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/ | + | | align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center | |
− | + | [https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Security_Is_Like_An_Onion_Thats_Why_It_Makes_You_Cry Security Is Like An Onion, That's Why It Makes You Cry]<br><br> | |
+ | Michele Chubirka | ||
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Anatomy_of_a_Logic_Flaw Anatomy of a Logic Flaw]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Anatomy_of_a_Logic_Flaw Anatomy of a Logic Flaw]<br><br> | ||
Charles Henderson and David Byrne | Charles Henderson and David Byrne | ||
Line 87: | Line 88: | ||
| align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#c0a0a0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Unraveling_some_of_the_Mysteries_around_DOMbased_XSS Unraveling some of the Mysteries around DOM-based XSS]<br><br> | ||
Dave Wichers | Dave Wichers | ||
− | | align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/ | + | | align=center width=200 valign=middle height=60 bgcolor=#ffdf80 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/2012_Global_Security_Report 2012 Global Security Report]<br><br> |
− | + | Tom Brennan and Nick Percoco | |
| align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Survivable_Software_for_CyberPhysical_Systems Survivable Software for Cyber-Physical Systems]<br><br> | | align=center width=200 valign=middle height=60 bgcolor=#a0c0e0 align=center |[https://www.owasp.org/index.php/OWASP_AppSec_DC_2012/Survivable_Software_for_CyberPhysical_Systems Survivable Software for Cyber-Physical Systems]<br><br> | ||
Karen Mercedes Goertzel | Karen Mercedes Goertzel |