Saturday, October 9, 2010

Trade Secrets

Trade Secrets

Training the Next Generation of Testers

Training the Next Generation of Testers

Tuning Teams Ppt

Tuning Teams Ppt Tuning Teams Ppt

User Experience, Not Metrics;

User Experience, Not Metrics;

Unsupported Protocols Ppt

Unsupported Protocols Ppt

Virtualizing Application Security:

Virtualizing Application Security:

Visual Modeling Ppt

Visual Modeling Ppt

Web Services SOA Testing Made Easy

Web Services SOA Testing Made Easy

Whats the Buzz About Fuzz

Whats the Buzz About Fuzz

You Inversion of Control Framework Secure

You Inversion of Control Framework Secure

Owasp2.0 Keynote

Owasp2.0 Keynote

Security in the Payment Card Industry

Security in the Payment Card Industry

Web Application Firewalls: When Are They Useful?

Web Application Firewalls: When Are They Useful?

Advanced SQL Injection

Advanced SQL Injection

Agile and Secure

Agile and Secure

Ajax Security Here We Go Again Content 20060829

Ajax Security Here We Go Again Content 20060829

Attacking Web Services

Attacking Web Services

A Web Services Project

A Web Services Project

OWASP CLASP Overview OWASP CLASP Presentation

Nick Coblentz (Nick.coblentz@Gmail.com) Http://Nickcoblentz.blogspot.com

1st Chapter Meeting Columbus, OH

1st Chapter Meeting Columbus, OH

Testing & Code Review Guides & Labrat

Testing & Code Review Guides & Labrat

Home-Grown Crypto (Aka Taking a Shiv To

Home-Grown Crypto (Aka Taking a Shiv To

Practice & Transfer of Learning in The

Practice & Transfer of Learning in The

Data Set

Data Set

OWASP 2.0 Membrs

OWASP 2.0 Membrs

Using Sprajax to Test AJAX Security

Using Sprajax to Test AJAX Security

The Nature of Exploratory Testing

The Nature of Exploratory Testing

Event Logs Management InfoSecHK

Event Logs Management InfoSecHK

Building More Secure Information Systems

Building More Secure Information Systems

Forceful Browsing Content

Forceful Browsing Content

Fortify Bjenkins App Sec Strategy 20070906

Fortify Bjenkins App Sec Strategy 20070906

-Google Hacking and Worms

-Google Hacking and Worms

Guide 2.0

Guide 2.0

In the Line of Fire:

In the Line of Fire:

In Line Approach for Secure Soap Requests

In Line Approach for Secure Soap Requests

Integration into the SDLC

Integration Into the SDLC

Introduction to OWASP

Introduction to OWASP

Java Project Status

Java Project Status

Software Testing as a Social Science

Software Testing as a Social Science

Managing Security Risk

Managing Security Risk

Open Source Security Testing Methodology Manual

Open Source Security Testing Methodology Manual

Owasp Status

Owasp Status

OWASP San Antonio

OWASP San Antonio

The Software Assurance Metrics and Tool Evaluation

The Software Assurance Metrics and Tool Evaluation

The Software Assurance Metrics and Tool Evaluation

The Software Assurance Metrics and Tool Evaluation

Protecting Web Services and a Applications

Protecting Web Services and a Applications

Putting Security Into SDLC-OWASP v2

Putting Security Into SDLC-OWASP v2

Request Rodeo

Request Rodeo

Secrets of Super Spies

Secrets of Super Spies

Securing J2EE Services

Securing J2EE Services

Security Metrics

Security Metrics

Security Pascarello

Security Pascarello

SecurityTestingthruAutomatedSWTests

SecurityTestingthruAutomatedSWTests

Software Fault Interactions

Software Fault Interactions

Standards Project

Standards Project

Tools Taxonomy

Tools Taxonomy

Top10-ComputerCrimes

Top10-ComputerCrimes

Top_Ten

Top_Ten

Web Services Security

Web Services Security

Web Application Security

Security Metrics