Back to Results
First PageMeta Content
Computer network security / Software testing / Cross-site request forgery / Cross-site scripting / ASP.NET / SQL injection / Code injection / Vulnerability / Computer security / Computing / Cyberwarfare / Software


.NET Threats & Countermeasures Hands-on Training (2 Days) Course description Secure programming is the best defense against hackers. This multilayered Hands on course will demonstrate live real time hacking methods , ana
Add to Reading List

Document Date: 2011-09-11 09:56:52


Open Document

File Size: 136,28 KB

Share Result on Facebook

Company

ASP.NET / The Anti-XSS Library ASP.NET / Implementing Captcha Asp.net / Access Insecure Direct Object Reference Using ASP.NET / /

IndustryTerm

analytical tools / side state management / web applications / software development lifecycle / time finding software vulnerabilities / exception management / software development team / /

OperatingSystem

Microsoft Windows / DoS / /

Organization

Validator Unit / /

Person

Erez Metula / /

Position

constant speaker at international security conferences / and the author / Player / /

Product

SQL Injection Stored procedures Preventing XPATH Injection Mitigating LDAP Injection / URL authorization Performing Input Validation Injection Flaws OS Command Injection Preventing SQL Injection / /

ProgrammingLanguage

SQL / XPATH / ASP.NET / HTML / /

Technology

traffic enforcement Insecure storage Symmetric encryption A-Symmetric encryption / RAM / HTML / SSL / communication Secure traffic enforcement Insecure storage Symmetric encryption / /

URL

Asp.net / .NET / /

SocialTag