File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
Items per page:
Search for media name:
Username:

descDate Name Thumbnail Size User Description Versions
11:11, 11 July 2013Secrets-as-a-Service.pdf (file)3.39 MBDancornellMatt Tesauro (and Jarret Raim)'s presentation on cloud-based key management in OpenStack. Presented at OWASP San Antonio on Wednesday July 10th, 2013.1
03:14, 1 August 2008Asmm levels small.png (file)15 KBDancornellApplication Security Maturity Model (ASMM) levels diagram. This is the small version.1
03:04, 1 August 2008Asmm levels.png (file)30 KBDancornellApplication Security Maturity Model (ASMM) basic levels graphic.1
07:26, 13 September 2007Fortify-bjenkins-AppSecStrategy-20070906.pdf (file)1.55 MBDancornellCategory:OWASP Presentations Over the past decade, the Department of Defense in general, and the US Air Force in particular, has transformed itself to better deal with 21st century warfare. The Air Force in fact has modified its stated mission to incl1
05:26, 7 November 2006ExampleAtlasPage.PNG (file)97 KBDancornell 2
05:15, 7 November 2006ExampleAtlasRequest.jpg (file)30 KBDancornell 1
00:18, 20 October 2006OWASPSanAntonio 2006 09 AgileAndSecure.pdf (file)588 KBDancornellCategory:OWASP Presentations Software development organizations find themselves being pulled in two directions. Agile software development methodologies such as eXtreme Programming and Scrum have allowed organizations to be more responsive to busines1
00:06, 20 October 2006OWASPSanAntonio 20040922.pdf (file)28 KBDancornellCategory:OWASP Presentations Basic overview of OWASP and the various projects. Used as the inaugural OWASP meeting for the San Antonio chapter.1
08:32, 30 August 2006DenimGroup AJAXSecurityHereWeGoAgain Content 20060829.pdf (file)188 KBDancornellCategory:OWASP Presentations Abstract: AJAX (or Asynchronous JavaScript And XML) is the hot new web programming technique being used to create rich Internet applications. By interacting with the server behind the scenes and updating web page DOMs, AJ1
08:41, 24 August 2006OWASPSanAntonio 2006 08 SingleSignOn.ppt (file)413 KBDancornellCategory:OWASP Presentations Presentation given to OWASP San Antonio on August 23, 2006 by Vijay Kumar. Abstract: Scattered software applications with differing security policies are a bane of today’s IT departments, consuming a large chunk of supp1
08:25, 10 July 2006OWASPSanAntonio 2006 05 ForcefulBrowsing Content.pdf (file)59 KBCategory:OWASP Presentations By Forceful Browsing, clients may be able to access pages which should be forbidden. A technique for preventing forceful browsing is introduced. With this technique, you may be assured that clients may only visit pages f1
08:11, 10 July 2006OWASPSanAntonio 2006 06 Crypto Content.pdf (file)429 KBCryptography Transitions are defined as "Managing the passage from one cryptographic architecture to another in a methodical approach that is consistent with prudent business practices and security guidelines." This talk will first discuss the technology 1