Explore
Featured
Recent
Articles
Topics
Login
Upload
Featured
Recent
Articles
Topics
Login
Upload
Search Results for 'Owasp-Data'
Owasp-Data published presentations and documents on DocSlides.
New OWASP Top 10 Items - 2017
by aaron
New OWASP Top 10 Items - 2017 Stephen Deck, GSE, ...
OWASP AppSec USA 2011
by trish-goza
OWASP AppSec USA 2011 An Introduction to ZAP The...
www.owasp.org | 1 Bangladesh Chapter
by min-jolicoeur
OWASP Bangladesh Chapter. Moshiul Islam, CISA- Fo...
OWASP Update Sebastien Deleersnyder
by test
seba@owasp.org. BE Board. OWASP Belgium Chapter M...
OWASP Funding and CEO Discussion
by tatiana-dople
PRESENTED BY. Keith . Turpin & Martin . Knobl...
OWASP Threat Dragon Mike Goodwin
by trish-goza
OWASP Newcastle. September 2017. Agenda. Threat m...
OWASP
by conchita-marotz
Top-10 2013. Dave Wichers. OWASP Top 10 Project L...
OWASP Top 10 – 2010
by kittie-lecroy
The Top 10 Most Critical Web Application Security...
OWASP
by lois-ondreau
Projects Portal Launch!. Jason Li. Global Project...
OWASP
by pasty-toler
AppSec. USA 2011. An Introduction to ZAP. The OWA...
The OWASP Enterprise Security API (ESAPI) Project
by test
Dave Wichers. Aspect Security COO. Volunteer Conf...
OWASP Code Review Eoin Keary
by trish-goza
Code review Lead. Irish Chapter Lead. 2. Agenda. ...
Introduction to Application Penetration Testing
by tatyana-admore
Robin Fewster. Introduction. Aim of this presenta...
BDD Mobile security testing with OWASP MASVS, OWASP MSTG and Calabash
by giovanna-bartolotta
About Me. #. whoami. Davide. . Cioccia. Security...
The bare minimum you should know about web application secu
by myesha-ticknor
Ken De Souza. KWSQA, April 2016. V. 1.0. Source: ...
Web Application Security
by tatyana-admore
Chris Edwards. Quintin Cutts. Steve McIntosh. htt...
OpenSAMM
by liane-varnes
Software Assurance Maturity Model. Seba. Deleers...
Source OWASP
by tatiana-dople
White Paper OWASP Top 10 - 2010 (Previous) OWASP ...
Automation Domination
by pamella-moone
Application Security with Continuous Integration ...
Code Review Guide Book 2.0
by faustina-dinatale
2013 PROJECT SUMMIT. About Me. About Me . www.voi...
CS6265: Information Security Lab
by yoshiko-marsland
Web Security. by. Shauvik. Roy . Choudhary. Some...
Continuous and Visible Security Testing
by dandy
Stephen de . Vries. . @. stephendv. w. ith BDD-Se...
BDD Mobile security testing with OWASP MASVS
by isabella
OWASP MSTG and Calabash About Me • #whoami • D...
Mobile Platform Security Models
by phoebe-click
John Mitchell. CS 155. Spring 2016. Outline. Intr...
Mobile Device and Platform Security – Part II
by tatyana-admore
John Mitchell. CS 155. Spring 2017. Guest Lecture...
Secure development (for a secure planet)
by alexa-scheidler
Eoin. . Keary. OWASP Board member. Senior Manage...
Mobile Device and Platform Security – Part II
by alida-meadow
John Mitchell. CS 155. Spring 2018. Two lectures ...
Intro to Web Application Security
by tawny-fly
. Francis Al Victoriano. The Web Apps. Email Sys...
Penetration Testing
by giovanna-bartolotta
. . Social Engineering Attack and . . ...
Automatic security
by lindy-dunigan
testin. g. tools . for web-based system. CS577b I...
ColdFusion Security Review
by karlyn-bohler
Presented by Denard Springle. NVCFUG January, 201...
OWASP Periodic Table of Vulnerabilities
by myesha-ticknor
James Landis. james.landis@owasp.org. The . AppSe...
Security and Privacy for the Internet of Things - Not
by myesha-ticknor
Miranda Mowbray. , HP Labs. miranda.mowbray at hp...
Intro to Ethical Hacking
by celsa-spraggs
MIS 5211.001. Week 10. Site: . http://community.m...
Load More...