×
Log in
Upload File
Most Popular
Study
Business
Design
Technology
Travel
Explore all categories
The top documents tagged [owasp foundation owasp]
Creating, obfuscating and analyzing malware JavaScript
2.198 views
Android reverse engineering: understanding third-party applications. OWASP EU Tour 2013 Bucharest (Romania)
924 views
IBM Rational Application Security Group (aka Watchfire) Web Based Man In the Middle Attack © 2009 IBM Corporation 1 Active Man in the Middle Attacks The
213 views
Copyright © 2007 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation
106 views
Encoded Attacks And Countermeasures
9.621 views
Web Application Security Strategy
767 views
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
4.192 views
Sigurnosne prijetnje i mjere zaštite IT infrastrukture
361 views
Web 2.0 threats, vulnerability analysis,secure web 2.0 application development and risk management
9.230 views
AppSec Latam 2011 - Treinamento OWASP Top 10 + JavaEE
100 views
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
159 views
07 a breaking_xml_signature_and_encryption_-_juraj_somorovsky
67 views
Next >