File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
Items per page:
Search for media name:
Username:

descDate Name Thumbnail Size User Description Versions
21:15, 18 April 2012ASDC12-2012 Global Security Report.pdf (file)2.82 MBMark.bristow 1
20:59, 18 April 2012ASDC12-What can an Acquirer do to prevent developers from makedangerous software errors.pdf (file)3.38 MBMark.bristow 1
20:59, 18 April 2012ASDC12-WhackaMobile II Mobile App Pen Testing with the MobiSecLive Environment.pdf (file)6.18 MBMark.bristow 1
20:59, 18 April 2012ASDC12-Web Application Defense with Bayesian Attack Analysis.pdf (file)2.02 MBMark.bristow 1
20:58, 18 April 2012ASDC12-Using PHPIDS to Understand Attacks Trends.pdf (file)2.69 MBMark.bristow 1
20:58, 18 April 2012ASDC12-Unraveling some of the Mysteries around DOMbased XSS.pdf (file)1.44 MBMark.bristow 1
20:58, 18 April 2012ASDC12-Understanding IAST More Context Better Analysis.pdf (file)3.81 MBMark.bristow 1
20:57, 18 April 2012ASDC12-The Unfortunate Reality of Insecure Libraries.pdf (file)2.66 MBMark.bristow 1
20:57, 18 April 2012ASDC12-The Easy Button for Your Web Application Security Career.pdf (file)2.42 MBMark.bristow 1
20:57, 18 April 2012ASDC12-Teaching an Old Dog New Tricks Securing Development with PMD.pdf (file)1.02 MBMark.bristow 1
20:57, 18 April 2012ASDC12-Survivable Software for CyberPhysical Systems.pdf (file)679 KBMark.bristow 1
20:57, 18 April 2012ASDC12-State of Web Security.pdf (file)1.09 MBMark.bristow 1
20:56, 18 April 2012ASDC12-Smart Bombs Mobile Vulnerability and Exploitation.pdf (file)2.26 MBMark.bristow 1
20:55, 18 April 2012ASDC12-SharePoint Security 101.pdf (file)4.34 MBMark.bristow 1
20:55, 18 April 2012ASDC12-Security Is Like An Onion Thats Why It Makes You Cry.pdf (file)276 KBMark.bristow 1
20:55, 18 April 2012ASDC12-Security is Dead Long Live Rugged DevOps IT at LudicrousSpeed.pdf (file)4.1 MBMark.bristow 1
20:55, 18 April 2012ASDC12-Security at scale Web application security in a continuousdeployment environment.pdf (file)1.07 MBMark.bristow 1
20:54, 18 April 2012ASDC12-Securing Critical Infrastructure.pdf (file)3.86 MBMark.bristow 1
20:54, 18 April 2012ASDC12-Risk Analysis and Measurement with CWRAF-1.pdf (file)3.88 MBMark.bristow 1
20:53, 18 April 2012ASDC12-Real world backdoors on industrial devices.pdf (file)1.48 MBMark.bristow 1
20:53, 18 April 2012ASDC12-Python Basics for Web App Pentesters Part 2.pdf (file)1.53 MBMark.bristow 1
20:52, 18 April 2012ASDC12-Project Basecamp News from Base 4.pdf (file)746 KBMark.bristow 1
20:52, 18 April 2012ASDC12-Proactive Risk Mitigation within the Software Development Lifecycle.pdf (file)1.08 MBMark.bristow 1
20:52, 18 April 2012ASDC12-Private information Protection in Cloud Computing LawsCompliance and Cloud Security Misconceptions.pdf (file)644 KBMark.bristow 1
20:51, 18 April 2012ASDC12-Pentesting Smart Grid Web Apps.pdf (file)2.03 MBMark.bristow 1
20:51, 18 April 2012ASDC12-OWASP Broken Web Applications OWASP BWA 10 Release.pdf (file)838 KBMark.bristow 1
20:51, 18 April 2012ASDC12-Overcoming the Quality vs Quantity Problem in SoftwareSecurity Testing.pdf (file)638 KBMark.bristow 1
20:51, 18 April 2012ASDC12-Old Webshells New Tricks How Persistent Threats haverevived an old idea and how you can detect them.pdf (file)2.44 MBMark.bristow 1
20:50, 18 April 2012ASDC12-New and Improved Hacking Oracle From Web.pdf (file)428 KBMark.bristow 1
20:49, 18 April 2012ASDC12-Mobile Application Security Who how and why.pdf (file)2.63 MBMark.bristow 1
20:48, 18 April 2012ASDC12-Hacking NETC Applications The Black Arts.pdf (file)4.79 MBMark.bristow 1
20:48, 18 April 2012ASDC12-Enterprise Security API ESAPI for C Plus Plus.pdf (file)1.45 MBMark.bristow 1
20:48, 18 April 2012ASDC12-Dynamic DASTWAF Integration.pdf (file)2.3 MBMark.bristow 1
20:48, 18 April 2012ASDC12-Denial of Surface.pdf (file)1.81 MBMark.bristow 1
20:47, 18 April 2012ASDC12-Cloudbased dWAF A Real World Deployment Case Study.pdf (file)445 KBMark.bristow 1
20:47, 18 April 2012ASDC12-Behind Enemy Lines Practical Triage Approaches to MobileSecurity Abroad 2012 Edition.pdf (file)1.31 MBMark.bristow 1
20:45, 18 April 2012ASDC12-Baking In Security Sweet Secure Cupcakes.pdf (file)1.93 MBMark.bristow 1
20:45, 18 April 2012ASDC12-Attacking CAPTCHAs for Fun and Profit.pdf (file)1.22 MBMark.bristow 1
20:44, 18 April 2012ASDC12-Android in the Healthcare Workplace A Case Study.pdf (file)78 KBMark.bristow 1
20:43, 18 April 2012ASDC12-Anatomy of a Logic Flaw.pdf (file)3.99 MBMark.bristow 1
20:42, 18 April 2012ASDC12-An InDepth Introduction to the Android Permissions Modeland How to Secure MultiComponent Applications.pdf (file)1.02 MBMark.bristow 1
20:41, 18 April 2012ASDC12-AMI Security.pdf (file)2.16 MBMark.bristow 1
20:41, 18 April 2012ASDC12-Access Control Designs and Pitfalls.pdf (file)141 KBMark.bristow 1
20:41, 18 April 2012ASDC12-DOMJacking Attack Exploit and Defense.pdf (file)2.25 MBMark.bristowReverted to version as of 01:38, 19 April 20123
20:07, 3 April 2012OWASP Presentation Template v2.zip (file)4.28 MBMark.bristowOWASP Presentation Template Last Updated 4/3/20121
14:40, 25 March 2012AppSecDC12-Cianfocca.jpg (file)23 KBMark.bristow 1
14:40, 25 March 2012AppSecDC12-henderson.jpg (file)22 KBMark.bristow 1
14:40, 25 March 2012AppSecDC12-los.jpg (file)26 KBMark.bristow 1
14:39, 25 March 2012AppSecDC12-Meisel.jpg (file)29 KBMark.bristow 2
14:39, 25 March 2012AppSecDC12-Searle.jpg (file)28 KBMark.bristow 1

First page
First page
Last page
Last page