File list

Jump to: navigation, search

This special page shows all uploaded files.

File list
 
First page
Previous page
Last page
Date Name Thumbnail Size Description Versions
21:15, 18 April 2012 ASDC12-2012 Global Security Report.pdf (file) 2.82 MB   1
20:59, 18 April 2012 ASDC12-What can an Acquirer do to prevent developers from makedangerous software errors.pdf (file) 3.38 MB   1
20:59, 18 April 2012 ASDC12-WhackaMobile II Mobile App Pen Testing with the MobiSecLive Environment.pdf (file) 6.18 MB   1
20:59, 18 April 2012 ASDC12-Web Application Defense with Bayesian Attack Analysis.pdf (file) 2.02 MB   1
20:58, 18 April 2012 ASDC12-Using PHPIDS to Understand Attacks Trends.pdf (file) 2.69 MB   1
20:58, 18 April 2012 ASDC12-Unraveling some of the Mysteries around DOMbased XSS.pdf (file) 1.44 MB   1
20:58, 18 April 2012 ASDC12-Understanding IAST More Context Better Analysis.pdf (file) 3.81 MB   1
20:57, 18 April 2012 ASDC12-The Unfortunate Reality of Insecure Libraries.pdf (file) 2.66 MB   1
20:57, 18 April 2012 ASDC12-The Easy Button for Your Web Application Security Career.pdf (file) 2.42 MB   1
20:57, 18 April 2012 ASDC12-Teaching an Old Dog New Tricks Securing Development with PMD.pdf (file) 1.02 MB   1
20:57, 18 April 2012 ASDC12-Survivable Software for CyberPhysical Systems.pdf (file) 679 KB   1
20:57, 18 April 2012 ASDC12-State of Web Security.pdf (file) 1.09 MB   1
20:56, 18 April 2012 ASDC12-Smart Bombs Mobile Vulnerability and Exploitation.pdf (file) 2.26 MB   1
20:55, 18 April 2012 ASDC12-SharePoint Security 101.pdf (file) 4.34 MB   1
20:55, 18 April 2012 ASDC12-Security Is Like An Onion Thats Why It Makes You Cry.pdf (file) 276 KB   1
20:55, 18 April 2012 ASDC12-Security is Dead Long Live Rugged DevOps IT at LudicrousSpeed.pdf (file) 4.1 MB   1
20:55, 18 April 2012 ASDC12-Security at scale Web application security in a continuousdeployment environment.pdf (file) 1.07 MB   1
20:54, 18 April 2012 ASDC12-Securing Critical Infrastructure.pdf (file) 3.86 MB   1
20:54, 18 April 2012 ASDC12-Risk Analysis and Measurement with CWRAF-1.pdf (file) 3.88 MB   1
20:53, 18 April 2012 ASDC12-Real world backdoors on industrial devices.pdf (file) 1.48 MB   1
20:53, 18 April 2012 ASDC12-Python Basics for Web App Pentesters Part 2.pdf (file) 1.53 MB   1
20:52, 18 April 2012 ASDC12-Project Basecamp News from Base 4.pdf (file) 746 KB   1
20:52, 18 April 2012 ASDC12-Proactive Risk Mitigation within the Software Development Lifecycle.pdf (file) 1.08 MB   1
20:52, 18 April 2012 ASDC12-Private information Protection in Cloud Computing LawsCompliance and Cloud Security Misconceptions.pdf (file) 644 KB   1
20:51, 18 April 2012 ASDC12-Pentesting Smart Grid Web Apps.pdf (file) 2.03 MB   1
20:51, 18 April 2012 ASDC12-OWASP Broken Web Applications OWASP BWA 10 Release.pdf (file) 838 KB   1
20:51, 18 April 2012 ASDC12-Overcoming the Quality vs Quantity Problem in SoftwareSecurity Testing.pdf (file) 638 KB   1
20:51, 18 April 2012 ASDC12-Old Webshells New Tricks How Persistent Threats haverevived an old idea and how you can detect them.pdf (file) 2.44 MB   1
20:50, 18 April 2012 ASDC12-New and Improved Hacking Oracle From Web.pdf (file) 428 KB   1
20:49, 18 April 2012 ASDC12-Mobile Application Security Who how and why.pdf (file) 2.63 MB   1
20:48, 18 April 2012 ASDC12-Hacking NETC Applications The Black Arts.pdf (file) 4.79 MB   1
20:48, 18 April 2012 ASDC12-Enterprise Security API ESAPI for C Plus Plus.pdf (file) 1.45 MB   1
20:48, 18 April 2012 ASDC12-Dynamic DASTWAF Integration.pdf (file) 2.3 MB   1
20:48, 18 April 2012 ASDC12-Denial of Surface.pdf (file) 1.81 MB   1
20:47, 18 April 2012 ASDC12-Cloudbased dWAF A Real World Deployment Case Study.pdf (file) 445 KB   1
20:47, 18 April 2012 ASDC12-Behind Enemy Lines Practical Triage Approaches to MobileSecurity Abroad 2012 Edition.pdf (file) 1.31 MB   1
20:45, 18 April 2012 ASDC12-Baking In Security Sweet Secure Cupcakes.pdf (file) 1.93 MB   1
20:45, 18 April 2012 ASDC12-Attacking CAPTCHAs for Fun and Profit.pdf (file) 1.22 MB   1
20:44, 18 April 2012 ASDC12-Android in the Healthcare Workplace A Case Study.pdf (file) 78 KB   1
20:43, 18 April 2012 ASDC12-Anatomy of a Logic Flaw.pdf (file) 3.99 MB   1
20:42, 18 April 2012 ASDC12-An InDepth Introduction to the Android Permissions Modeland How to Secure MultiComponent Applications.pdf (file) 1.02 MB   1
20:41, 18 April 2012 ASDC12-AMI Security.pdf (file) 2.16 MB   1
20:41, 18 April 2012 ASDC12-Access Control Designs and Pitfalls.pdf (file) 141 KB   1
20:41, 18 April 2012 ASDC12-DOMJacking Attack Exploit and Defense.pdf (file) 2.25 MB Reverted to version as of 01:38, 19 April 2012 3
20:07, 3 April 2012 OWASP Presentation Template v2.zip (file) 4.28 MB OWASP Presentation Template Last Updated 4/3/2012 1
14:40, 25 March 2012 AppSecDC12-Cianfocca.jpg (file) 23 KB   1
14:40, 25 March 2012 AppSecDC12-henderson.jpg (file) 22 KB   1
14:40, 25 March 2012 AppSecDC12-los.jpg (file) 26 KB   1
14:39, 25 March 2012 AppSecDC12-Meisel.jpg (file) 29 KB   2
14:39, 25 March 2012 AppSecDC12-Searle.jpg (file) 28 KB   1
First page
Previous page
Last page