Testing collection
Jmeter , Testing ,Selenium
Saturday, October 9, 2010
Trade Secrets
Trade Secrets
Training the Next Generation of Testers
Training the Next Generation of Testers
Tuning Teams Ppt
Tuning Teams Ppt
Tuning Teams Ppt
User Experience, Not Metrics;
User Experience, Not Metrics;
Unsupported Protocols Ppt
Unsupported Protocols Ppt
Virtualizing Application Security:
Virtualizing Application Security:
Visual Modeling Ppt
Visual Modeling Ppt
Web Services SOA Testing Made Easy
Web Services SOA Testing Made Easy
Whats the Buzz About Fuzz
Whats the Buzz About Fuzz
You Inversion of Control Framework Secure
You Inversion of Control Framework Secure
Owasp2.0 Keynote
Owasp2.0 Keynote
Security in the Payment Card Industry
Security in the Payment Card Industry
Web Application Firewalls: When Are They Useful?
Web Application Firewalls: When Are They Useful?
Advanced SQL Injection
Advanced SQL Injection
Agile and Secure
Agile and Secure
Ajax Security Here We Go Again Content 20060829
Ajax Security Here We Go Again Content 20060829
Attacking Web Services
Attacking Web Services
A Web Services Project
A Web Services Project
OWASP CLASP Overview OWASP CLASP Presentation
Nick Coblentz (Nick.coblentz@Gmail.com) Http://Nickcoblentz.blogspot.com
1st Chapter Meeting Columbus, OH
1st Chapter Meeting Columbus, OH
Testing & Code Review Guides & Labrat
Testing & Code Review Guides & Labrat
Home-Grown Crypto (Aka Taking a Shiv To
Home-Grown Crypto (Aka Taking a Shiv To
Practice & Transfer of Learning in The
Practice & Transfer of Learning in The
Data Set
Data Set
OWASP 2.0 Membrs
OWASP 2.0 Membrs
Using Sprajax to Test AJAX Security
Using Sprajax to Test AJAX Security
The Nature of Exploratory Testing
The Nature of Exploratory Testing
Event Logs Management InfoSecHK
Event Logs Management InfoSecHK
Building More Secure Information Systems
Building More Secure Information Systems
Forceful Browsing Content
Forceful Browsing Content
Fortify Bjenkins App Sec Strategy 20070906
Fortify Bjenkins App Sec Strategy 20070906
-Google Hacking and Worms
-Google Hacking and Worms
Guide 2.0
Guide 2.0
In the Line of Fire:
In the Line of Fire:
In Line Approach for Secure Soap Requests
In Line Approach for Secure Soap Requests
Integration into the SDLC
Integration Into the SDLC
Introduction to OWASP
Introduction to OWASP
Java Project Status
Java Project Status
Software Testing as a Social Science
Software Testing as a Social Science
Managing Security Risk
Managing Security Risk
Open Source Security Testing Methodology Manual
Open Source Security Testing Methodology Manual
Owasp Status
Owasp Status
OWASP San Antonio
OWASP San Antonio
The Software Assurance Metrics and Tool Evaluation
The Software Assurance Metrics and Tool Evaluation
The Software Assurance Metrics and Tool Evaluation
The Software Assurance Metrics and Tool Evaluation
Protecting Web Services and a Applications
Protecting Web Services and a Applications
Putting Security Into SDLC-OWASP v2
Putting Security Into SDLC-OWASP v2
Request Rodeo
Request Rodeo
Secrets of Super Spies
Secrets of Super Spies
Securing J2EE Services
Securing J2EE Services
Security Metrics
Security Metrics
Security Pascarello
Security Pascarello
SecurityTestingthruAutomatedSWTests
SecurityTestingthruAutomatedSWTests
Software Fault Interactions
Software Fault Interactions
Standards Project
Standards Project
Tools Taxonomy
Tools Taxonomy
Top10-ComputerCrimes
Top10-ComputerCrimes
Top_Ten
Top_Ten
Web Services Security
Web Services Security
Web Application Security
Security Metrics
Friday, October 8, 2010
The 5 Percent Rules of Test Automation
The 5 Percent Rules of Test Automation
Newer Posts
Older Posts
Home
Subscribe to:
Posts (Atom)