This site is the archived OWASP Foundation Wiki and is no longer accepting Account Requests.
To view the new OWASP Foundation website, please visit https://owasp.org
Pages with the most categories
Showing below up to 500 results in range #501 to #1,000.
View (previous 500 | next 500) (20 | 50 | 100 | 250 | 500)
- 2015 BASC Agenda (3 categories)
- OWASP Testing Guide Appendix B: Suggested Reading (3 categories)
- Switzerland (3 categories)
- OWASP Data Exchange Format Project (3 categories)
- Eugene (3 categories)
- Loss of accountability (3 categories)
- Bytecode obfuscation (3 categories)
- AppSec Israel 2016 (3 categories)
- AppSecEU2013/Ticket-Challenge (3 categories)
- 2016 BASC Homepage (3 categories)
- 2018 BASC Speakers (3 categories)
- Trichy (3 categories)
- OWASP Education Presentation (3 categories)
- Virtual North America (3 categories)
- OWASP Testing Guide v4 Table of Contents (3 categories)
- BASC 2017 Call For Papers (3 categories)
- OWASP Security Baseline Project (3 categories)
- Hokushinetsu (3 categories)
- Germany/Projekte/Top 10 fuer Entwickler-2013/Über OWASP (3 categories)
- Nagoya (3 categories)
- Almeria (3 categories)
- 2010 BASC Speakers (3 categories)
- 2013 BASC Sponsorship (3 categories)
- 2017 BASC Speakers (3 categories)
- OWASP Security Ninja Project (3 categories)
- Full Path Disclosure (3 categories)
- 2014 BASC Presentations (3 categories)
- Estonia (3 categories)
- 2019 BASC Agenda (3 categories)
- 2011 BASC Agenda (3 categories)
- Mobile code: invoking untrusted mobile code (3 categories)
- OWASP German Chapter Stammtisch Initiative (3 categories)
- Setting Manipulation (3 categories)
- GPC Project Details/OWASP Google Hacking Project (3 categories)
- Key West (3 categories)
- Atlanta Georgia (3 categories)
- OWASP AppSec DC 2012/Training/The Art of exploiting Injection Flaws (3 categories)
- Royal Holloway (3 categories)
- OWASP iGoat Project (3 categories)
- Establish secure defaults (code modification prevention) (3 categories)
- The .Net Framework is also affected by the WMF vulnerabilty (3 categories)
- Uganda (3 categories)
- OWASP AppSec DC 2012/Anatomy of a Logic Flaw (3 categories)
- Italy (3 categories)
- Testing for User Input as a Loop Counter (OWASP-DS-005) (3 categories)
- Manila (3 categories)
- 2015 BASC Speakers (3 categories)
- AppSec Israel 2014 (3 categories)
- OWASP Metrics Project Roadmap (3 categories)
- Oman (3 categories)
- Baseline Assessor Qual and Eval Criteria (3 categories)
- OWASP Security Tools for Developers Project (3 categories)
- OWASP Hungarian Translation Project (3 categories)
- Norway (3 categories)
- OWASP Forward Exploit Tool Project (3 categories)
- Testing for AJAX Vulnerabilities (OWASP-AJ-001) (3 categories)
- Punjab (3 categories)
- 2018 BASC Homepage (3 categories)
- OWASP China Summit 2010 (3 categories)
- 2018 BASC Presentations (3 categories)
- BASC 2016 Call For Papers (3 categories)
- AppSec Israel 2016 CTF (3 categories)
- Bulgaria (3 categories)
- Jakarta (3 categories)
- Canary Islands (3 categories)
- Russia (3 categories)
- OWASP Enterprise Application Security Project (3 categories)
- Akita (3 categories)
- How to create a general purpose input validation system (3 categories)
- 2015 BASC InfoSec Communication Workshop (3 categories)
- 2010 BASC:Sponsors (3 categories)
- OWASP Guide de Test v4-Annexe B-Conseils de Lecture (3 categories)
- Session Prediction (3 categories)
- Germany/Chaptersponsor (3 categories)
- 2017 BASC Presentations (3 categories)
- OWASP JSON Sanitizer (3 categories)
- GPC Project Details/OWASP Hungarian Translation Project (3 categories)
- 2014 BASC Speakers (3 categories)
- Business logic vulnerability (3 categories)
- Parameter Validation Filter (3 categories)
- 2011 BASC Sponsors (3 categories)
- San Pedro Sula (3 categories)
- South Dakota (3 categories)
- How to specify verification requirements in contracts (3 categories)
- Insecure Third Party Domain Access (3 categories)
- Defense in depth (3 categories)
- Charlottesville (3 categories)
- Boston (3 categories)
- OWASP AppSec DC 2012/Training/Virtual Patching Workshop (3 categories)
- Madison (3 categories)
- WAF and Business Logic Attacks (3 categories)
- Lovely Professional University Student Chapter (3 categories)
- Agra (3 categories)
- GPC Project Details/OWASP Security Assurance Testing of Virtual Worlds Project (3 categories)
- Repudiation Attack (3 categories)
- Don’t trust local resources (code modification prevention) (3 categories)
- AppSec Israel 2015 (3 categories)
- Testing Guide Introduction (3 categories)
- 2015 BASC Presentations (3 categories)
- Toronto (3 categories)
- Business Justification for Application Security Assessment (3 categories)
- Medford (3 categories)
- NewBrunswick (3 categories)
- Fukushima (3 categories)
- Iran (3 categories)
- BASC 2018 Call For Papers (3 categories)
- AppSec Israel 2016 Sponsorships (3 categories)
- 2018 BASC Workshops (3 categories)
- VIT University (3 categories)
- 2016 BASC Speakers (3 categories)
- 2018 BASC Agenda (3 categories)
- Los Angeles (3 categories)
- Chapter Presentation Bundles (3 categories)
- XSS Filter Evasion Cheat Sheet (3 categories)
- Kumaun Region (3 categories)
- 2017 BASC Homepage (3 categories)
- Triangle (3 categories)
- 2015 BASC Resume Room (3 categories)
- 2010 BASC Sponsors (3 categories)
- 2019 BASC Presentations (3 categories)
- OWASP SIMBA Project (3 categories)
- Kanpur (3 categories)
- 2011 BASC Sponsorship (3 categories)
- Brute force attack (3 categories)
- Mobile code: object hijack (3 categories)
- Testing for XML Content-Level (OWASP-WS-004) (3 categories)
- OWASP Browser Security ACID Tests Project (3 categories)
- OWASP Myth Breakers Project (3 categories)
- OWASP ESOP Framework (3 categories)
- Windows Path Link problems (3 categories)
- BostonFinancialDist (3 categories)
- OWASP AppSec DC 2012/Training/Application Source Code Analysis - Discovering Vulnerabilities in Web 2.0, HTML5 and RIA (3 categories)
- Southern Nevada (3 categories)
- Blind XPath Injection (3 categories)
- Possible Type Confusion issue in .Net 1.1 (only works in Full Trust) (3 categories)
- Create unpredictable defenses (code modification prevention) (3 categories)
- Cross-User Defacement (3 categories)
- Germany (3 categories)
- GPC Project Details/OWASP CBT Project (3 categories)
- Testing for DoS Failure to Release Resources (OWASP-DS-007) (3 categories)
- OWASP AppSec DC 2012/Mobile Application Security Who how and why (3 categories)
- Turkey (3 categories)
- Nashua (3 categories)
- Denver (3 categories)
- OWASP Validation Regex Repository (3 categories)
- BASC 2019 Call For Papers (3 categories)
- Sharqiyah (3 categories)
- Indianapolis (3 categories)
- Porto (3 categories)
- Alexandria (3 categories)
- Suncoast (3 categories)
- AppSecEU2013/CfTrainings (3 categories)
- Vietnam (3 categories)
- OWASP Java XML Templates Project (3 categories)
- Hereford (3 categories)
- AppSecEU2013/Uni-Challenge (3 categories)
- 2016 BASC Presentations (3 categories)
- Alabama (3 categories)
- Aguascalientes Mexico (3 categories)
- OWASP Bywaf Project (3 categories)
- Ankara (3 categories)
- 2012 BASC Homepage (3 categories)
- Natori (3 categories)
- 2017 BASC Resume Room (3 categories)
- Parameterized Command Interface (3 categories)
- Testing for Denial of Service (3 categories)
- 2014 BASC Agenda (3 categories)
- 2019 BASC Speakers (3 categories)
- OWASP VFW Project (3 categories)
- OWASP WAF Project (3 categories)
- 2011 BASC Speakers (3 categories)
- Peru (3 categories)
- OWASP File Hash Repository (3 categories)
- Parameter Delimiter (3 categories)
- OWASP AJAX Crawling Tool (3 categories)
- OWASP Web Browser Testing System Project (3 categories)
- OWASP Anti-Malware Project (3 categories)
- Detect intrusions (3 categories)
- Dehradun (3 categories)
- Windows Shortcut Following (.LNK) (3 categories)
- OWASP Java HTML Sanitizer Project (3 categories)
- Vijayawada (3 categories)
- Buffalo (3 categories)
- OWASP AppSec DC 2012/Training/Mobile Hacking and Securing (3 categories)
- Kharkiv National University of Radio Electronics (3 categories)
- South Florida (3 categories)
- London Chapter WAF event (3 categories)
- Cryptanalysis (3 categories)
- Delaware (3 categories)
- Guide to Cryptography (3 categories)
- Odessa (3 categories)
- Projects/Opa (3 categories)
- Inyección XPath Ciega (3 categories)
- OWASP AppSec DC 2012/Securing Critical Infrastructure (3 categories)
- London (3 categories)
- Testing for Storing too Much Data in Session (OWASP-DS-008) (3 categories)
- OWASP AppSec DC 2012/Overcoming the Quality vs Quantity Problem in SoftwareSecurity Testing (3 categories)
- Winnipeg (3 categories)
- OWASP O2 Platform/Microsoft/ActiveX (3 categories)
- OWASP ESAPI C++ Project (3 categories)
- OWASP Testing Project Roadmap (3 categories)
- OWASP AppSec DC 2012/Access Control Designs and Pitfalls (3 categories)
- 2019 BASC Homepage/COC (3 categories)
- Code Reviews and Other Verification Activities: USELESS Unless Acted Upon IMMEDIATELY (3 categories)
- Mumbai Student Chapter (3 categories)
- Top 10 2013-Top 10 (3 categories)
- Sudan (3 categories)
- AppSecEU2013/Capture-the-Flag (3 categories)
- OWASP AI Projects (3 categories)
- 2016 BASC Agenda (3 categories)
- Losing your money (3 categories)
- Expression Language Injection (3 categories)
- 2018 BASC Resume Room (3 categories)
- 2010 BASC Agenda (3 categories)
- Projects/OWASP Bywaf Project (3 categories)
- OWASP Alchemist Project (3 categories)
- Iowa City (3 categories)
- 2012 BASC Agenda (3 categories)
- 2010 BASC Call For Papers (3 categories)
- Southern Maryland (3 categories)
- East Sweden (3 categories)
- Germany/Speaker (3 categories)
- Germany/Projekte/Top 10-2013-Inhaltsverzeichnis (3 categories)
- OWASP Web Service Attack Community Project (3 categories)
- Hartford (3 categories)
- Germany/Konferenzen (3 categories)
- OWASP Uniform Reporting Guidelines (3 categories)
- 2017 BASC Agenda (3 categories)
- Venezuela (3 categories)
- Scala Frameworks (3 categories)
- Chhattisgarh (3 categories)
- Security Ecosystem Project (3 categories)
- 2019 BASC Workshops (3 categories)
- OWASP ESAPI Perl Project (3 categories)
- 2011 BASC Presentations (3 categories)
- Logic/time bomb (3 categories)
- Sri Lanka (3 categories)
- New Jersey Central (3 categories)
- Geneva (3 categories)
- Minimize attack surface area (3 categories)
- Relative Path Traversal (3 categories)
- Session hijacking attack (3 categories)
- OWASP ISO IEC 27034 Application Security Controls Project (3 categories)
- Using a broken or risky cryptographic algorithm (3 categories)
- Kyushu (3 categories)
- Windows Virtual File problems (3 categories)
- OWASP Java Encoder Project (3 categories)
- Charlotte (3 categories)
- OWASP AppSec DC 2012/Training/Pratical Threat Modeling (3 categories)
- Guidelines for OWASP Projects (3 categories)
- Policy Frameworks (3 categories)
- OWASP Web Application Security Accessibility Project (3 categories)
- Columbia (3 categories)
- Defense in depth (code modification prevention) (3 categories)
- Buffer Overflow (3 categories)
- Hong Kong (3 categories)
- Testing for DoS Locking Customer Accounts (OWASP-DS-002) (3 categories)
- Malaysia (3 categories)
- OWASP AppSec DC 2012/Training/Certified Secure Software Lifecycle Professional (CSSLP) Clinic (3 categories)
- Definition for Security Assessment Levels (3 categories)
- Agile Software Development: Don't Forget EVIL User Stories (3 categories)
- Sevilla (3 categories)
- JSP JSTL (3 categories)
- McAllen Texas (3 categories)
- Loss of confidentiality (3 categories)
- OWASP Application Security Program for Managers (3 categories)
- 2016 BASC Workshops (3 categories)
- Losing customer’s money (3 categories)
- OWASP Software Security 5D Framework Table of Contents (3 categories)
- AppSecEU2013 (3 categories)
- Vellore (3 categories)
- 2012 BASC Presentations (3 categories)
- 2010 BASC Homepage (3 categories)
- Kumaun (3 categories)
- Germany/Assets (3 categories)
- San Juan (3 categories)
- Tampa (3 categories)
- AppSec Israel 2017 (3 categories)
- Germany/Projekte (3 categories)
- OWASP CSRFGuard Project/es (3 categories)
- OWASP Exams Project (3 categories)
- Orlando (3 categories)
- The ESAPI Web Application Firewall (ESAPI WAF) (3 categories)
- New Jersey North (3 categories)
- Separation of duties (3 categories)
- Resource Injection (3 categories)
- Washington DC (3 categories)
- Covert storage channel (3 categories)
- Improper pointer subtraction (3 categories)
- Web Parameter Tampering (3 categories)
- OWASP Global AppSec Asia 2011 (3 categories)
- Don’t trust services (3 categories)
- OWASP AppSec DC 2012/Training/Assessing and Exploiting Web Applications with Samurai-WTF (3 categories)
- Busan Student Chapter (3 categories)
- Windows hard link (3 categories)
- OWASP AppSec DC 2012/Training/WebAppSec: Developing Secure Web Applications (3 categories)
- Stockholm (3 categories)
- Security by Design Principles (3 categories)
- Session fixation (3 categories)
- Positive security model (code modification prevention) (3 categories)
- San Antonio (3 categories)
- OWASP AppSec DC 2012/Python Basics for Web App Pentesters Part 2 (3 categories)
- OWASP AppSec DC 2012/Pentesting Smart Grid Web Apps (3 categories)
- Bulawayo (3 categories)
- 2014 BASC Homepage (3 categories)
- Definition for Security Assessment Techniques (3 categories)
- Slovenia (3 categories)
- OWASP Application Security Skills Assessment (3 categories)
- 2010 BASC Presentations (3 categories)
- AppSecEU2013/CfPresos (3 categories)
- Loss of integrity (3 categories)
- Campinas (3 categories)
- How to Build an HTTP Request Validation Engine for Your J2EE Application (3 categories)
- Doubly freeing memory (3 categories)
- 2018 BASC Homepage/COC (3 categories)
- 2016 BASC Resume Room (3 categories)
- Losing opportunity to make money (3 categories)
- BASC 2012 CFP (3 categories)
- Surat (3 categories)
- 2012 BASC Speakers (3 categories)
- SanDiego (3 categories)
- 2010 BASC Request For Sponsors (3 categories)
- Boulder (3 categories)
- Sukkur (3 categories)
- OWASP Secure Password Project (3 categories)
- Cairo (3 categories)
- OWASP Browser Security Project (3 categories)
- BeNeLux OWASP Day 2010 (3 categories)
- 2013 BASC Homepage (3 categories)
- State College PA (3 categories)
- OWASP Portuguese Language Project (3 categories)
- Taganrog (3 categories)
- Vermont (3 categories)
- Helsinki (3 categories)
- Null Dereference (3 categories)
- Sao Luis (3 categories)
- Fix security issues correctly (3 categories)
- Log review and management (3 categories)
- GPC Project Details/OWASP JSReg Project (3 categories)
- OWASP DVIA (3 categories)
- Establish secure defaults (3 categories)
- OWASP AppSec DC 2012/Training/Building Secure Android Apps (3 categories)
- Jaipur (3 categories)
- OWASP Threat Modelling Project (3 categories)
- Kansai (3 categories)
- Ohio (3 categories)
- OWASP SiteGenerator (3 categories)
- Phoenix (3 categories)
- Traffic flood (3 categories)
- Configuration (3 categories)
- Detect integrity violation incidents (code modification prevention) (3 categories)
- Saint Louis (3 categories)
- BASC 2015 Call For Papers (3 categories)
- Path Manipulation (3 categories)
- 2014 BASC Sponsorship (3 categories)
- Appendix A: Testing Tools (3 categories)
- Spain (3 categories)
- Spotsylvania (3 categories)
- OWASP ESAPI C Project (3 categories)
- 2019 BASC Homepage (3 categories)
- Regular expression Denial of Service - ReDoS (3 categories)
- San Francisco (2 categories)
- GPC/Meetings/2012-07-12 (2 categories)
- Lviv (2 categories)
- BeNeLux OWASP Day 2016 (2 categories)
- Cyber-Assurance Ecosystem - Automation Activities for Securing the Enterprise (2 categories)
- GPC/Meetings/2012-27-12 (2 categories)
- OWASP Risk Rating Methodology(Japanese) (2 categories)
- Lowcountry (2 categories)
- Burkina Faso (2 categories)
- Pen-Test Panel (2 categories)
- Fingerprint Web Server (OTG-INFO-002) (2 categories)
- Top 10-2017 A10-Insufficient Logging&Monitoring (2 categories)
- Germany/Projekte/Top 10 fuer Entwickler-2013/A1-Injection (2 categories)
- Reflected File Download (2 categories)
- Top 10 2013 (2 categories)
- Tripoli (2 categories)
- Top 10 2013-A3-Cross-Site Scripting (XSS) (2 categories)
- Projects/RFP-Criteria (2 categories)
- Summit 2011 Working Sessions/Session005 (2 categories)
- OWASP Limerick Day 2012 (2 categories)
- KR (2 categories)
- Access Control In Your J2EE Application (2 categories)
- Riviera Maya (2 categories)
- Summit 2011 Working Sessions/Session013 (2 categories)
- Germany/Projekte/Top 10 fuer Entwickler-2013/A6-Verlust der Vertraulichkeit sensibler Daten (2 categories)
- Long Island (2 categories)
- Testing for misconfiguration (2 categories)
- Summit 2011 Working Sessions/Session021 (2 categories)
- Testing for Stored Cross site scripting (OTG-INPVAL-002) (2 categories)
- Summit 2011 Working Sessions/Session029 (2 categories)
- Germany/Projekte/Top 10 fuer Entwickler-2013/A10-Ungeprüfte Um- und Weiterleitungen (2 categories)
- Using the Java Secure Socket Extensions (2 categories)
- Summit 2011 Working Sessions/Session038 (2 categories)
- OWASP Application Security Curriculum (2 categories)
- Slovakia (2 categories)
- OWASP Software Security 5D Framework (2 categories)
- OWASP Stammtisch Karlsruhe (2 categories)
- Summit 2011 Working Sessions/Session046 (2 categories)
- Germany/Projekte/Top 10 fuer Entwickler-2013/Nächste Schritte für Organisationen (2 categories)
- Dorset (2 categories)
- Summit 2011 Working Sessions/Session056 (2 categories)
- GPC/Meetings/2013-19-04 (2 categories)
- Chattanooga (2 categories)
- The Insecure-Bootstrapping Principle (2 categories)
- OWASP Education Project Modules (2 categories)
- France/OWASP projects and resources you can use TODAY (2 categories)
- Testing Multiple Factors Authentication (OWASP-AT-009) (2 categories)
- Summit 2011 Working Sessions/Session067 (2 categories)
- Summit 2011 Working Sessions/Session075 (2 categories)
- Copenhagen (2 categories)
- Exploiting the media for fun and profit. Analysis of a new type of web application attacks through media files (2 categories)
- University of Texas Student Chapter (2 categories)
- Little Rock (2 categories)
- Summit 2011 Working Sessions/Session086 (2 categories)
- Providing application-level assurance through DNSSEC (2 categories)
- Top 10-2017 Release Notes (2 categories)
- Summit 2011 Working Sessions/Session094 (2 categories)
- Struts (2 categories)
- Unlocking the Toolkit: Attacking Google Web Toolkit (2 categories)
- Test HTTP Strict Transport Security (OTG-CONFIG-007) (2 categories)
- Top 10-2017 A9-Using Components with Known Vulnerabilities (2 categories)
- Python Basics for Web App Pentesters (2 categories)
- Testing for failure to restrict access to authenticated resource(OWASP-AT-010) (2 categories)
- Albuquerque (2 categories)
- Don't Judge a Website by its Icon - Read the Label! (2 categories)
- Testing for Unvalidated Redirects and Forwards (OWASP-DV-004) (2 categories)
- Germany/Projekte/Top 10 fuer Entwickler-2013/Neuerungen (2 categories)
- Past Research on ASP.NET CAS (Code Access Security) (2 categories)
- Testing for Insecure Direct Object References (OTG-AUTHZ-004) (2 categories)
- OWASP German Chapter Stammtisch Initiative/Ruhrpott/20170529 (2 categories)
- MRB Scratchpad (2 categories)
- WS Information Gathering (OWASP-WS-002) (2 categories)
- Testing for Account Enumeration and Guessable User Account (OTG-IDENT-004) (2 categories)
- Threat Modeling Express (2 categories)
- WS BEPL Testing (OWASP-WS-010) (2 categories)
- 4.3.4 Revue des fichiers pour recherche d'informations sensibles (OTG-CONFIG-004) (2 categories)
- Germany/Aktuelles (2 categories)
- OWASP Gothenburg Day 2015 (2 categories)
- Buffer Overflow via Environment Variables (2 categories)
- Review webpage comments and metadata for information leakage (OTG-INFO-005) (2 categories)
- Summit 2011 Working Sessions/Session103 (2 categories)
- Business Logic Automatons: Friend or Foe (2 categories)
- Macedonia (2 categories)
- Fingerprint Web Application (OTG-INFO-009) (2 categories)
- Testing: Information Gathering (2 categories)
- Transparent Proxy Abuse (2 categories)
- Lithuania (2 categories)
- Projects Summit 2013/Working Sessions/004 (2 categories)
- Ranchi (2 categories)
- Development Issues Within AJAX Applications: How to Divert Threats (2 categories)
- Summit 2011 Working Sessions/Session201 (2 categories)
- Map Application Architecture (OTG-INFO-010) (2 categories)
- Testing for DB Listener (OWASP-CM-002) (2 categories)
- The OWASP Security Spending Benchmarks Project (2 categories)
- Bolivia (2 categories)
- Test Local Storage (OTG-CLIENT-012) (2 categories)
- Test HTTP Methods (OTG-CONFIG-006) (2 categories)
- OWASP Live CD: An open environment for Web Application Security. (2 categories)
- 4.7 Test de management de sessions (2 categories)
- Use encapsulation (2 categories)
- OWASP Documentation Project Template (2 categories)
- Testing for XPath Injection (OTG-INPVAL-010) (2 categories)
- Promoting Application Security within Federal Government (2 categories)
- Projects Summit 2013/Working Sessions/0014 (2 categories)
- Testing for Format String (2 categories)
- Introducing the Web Application Security Scanner Evaluation Criteria (2 categories)
- 4.8 Tester la validation des entrées (2 categories)
- Curitiba (2 categories)
- 4.8.2 Test de Stored Cross-Site Scripting (OTG-INPVAL-002) (2 categories)
- Summit 2011 Working Sessions/Session0207 (2 categories)
- UW Bothell (2 categories)
- Web Application Security Scanner Evaluation Criteria (2 categories)
- Birmingham (2 categories)
- Summit 2011 Working Sessions/Session256 (2 categories)
- Testing for Sensitive information sent via unencrypted channels (OTG-CRYPST-003) (2 categories)
- Belo Horizonte (2 categories)
- 4.8.10 Tester les injections XPath (OTG-INPVAL-010) (2 categories)
- How to create verification project schedules (2 categories)
- Summit 2011 Working Sessions/Session264 (2 categories)
- Testing for HTML Injection (OTG-CLIENT-003) (2 categories)
- 4.8.14.2 Tester les débordements de pile (2 categories)
- Unchecked Error Condition (2 categories)
- Namibia (2 categories)
- Cleveland (2 categories)
- Assessment Criteria v2.0 (2 categories)
- OWASP German Chapter Stammtisch Initiative/Ruhrpott/20150324 (2 categories)
- Testing for weak Cryptography (2 categories)
- Bogota (2 categories)
- Leeds Beckett University Student Chapter (2 categories)
- File System (2 categories)
- Florianopolis (2 categories)
- RuntimeMethodHandle.GetFunctionPointer() doesn't demand UnmanagedCode Security Permission (2 categories)
- Authorization form/ja (2 categories)
- SAMM - Strategy & Metrics - 3 (2 categories)
- OWASP AppSec DC 2012/The Unfortunate Reality of Insecure Libraries (2 categories)
- Cagayan Valley (2 categories)
- SAMM - Threat Assessment - 2 (2 categories)
- 2004 Updates OWASP Top Ten Project (2 categories)
- OWASP AppSec DC 2012/The Easy Button for Your Web Application Security Career (2 categories)