Cross-application scripting

Results: 523



#Item
91Internet privacy / HTTP cookie / Cross-site scripting / Client–server model / Hypertext Transfer Protocol / Spring Security / Computing / Internet / HTTP

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D2.1

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2011-10-25 10:27:29
92Cross-site scripting / SOAP / WS-Security / Web Services Description Language / World Wide Web / Penetration test / Application security / XML / XML-Enabled Networking / Computing / Web standards / Web services

Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps Web Services represent a new and unexplored set of securitysensitive technologies that have been widely deployed by large companies, governments,

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
93Cross-site request forgery / Computer network security / Cross-site scripting / Confused deputy problem / World Wide Web / Web cache / Vulnerability / Web application security / Cross-application scripting / Cyberwarfare / Computer security / Computing

Preparing for the Cross Site Request Forgery Defense Chuck Willis Black Hat DC 2008 February 20, 2008

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:26
94Scripting languages / Java platform / Groovy / Web application frameworks / Java / Dynamic programming language / Python / Smalltalk / Grails / Computing / Software engineering / Cross-platform software

A Thorough Introduction To Groovy Jeff Brown G2One - Director North American Operations

Add to Reading List

Source URL: www.trijug.org

Language: English - Date: 2014-03-19 22:20:41
95Scripting languages / JavaScript / Ajax / HTTP / Cross-platform software / Cross-site scripting / HTTP cookie / ECMAScript / XMLHttpRequest / Computing / Software engineering / Computer programming

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.3

Add to Reading List

Source URL: www.websand.eu

Language: English - Date: 2014-05-11 17:31:13
96Cross-site scripting / SQL injection / JavaScript / World Wide Web / Cyberwarfare / Computer security / Computing

Detection of SQL Injection and Cross-site Scripting Attacks Introduction In the last couple of years, attacks against the web application layer have gained increasing important. This is because no matter how strong your

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:35
97Computer network security / Software testing / Electronic commerce / Hacking / Cross-site scripting / Vulnerability / Application security / SQL injection / Cross-site request forgery / Cyberwarfare / Computer security / Security

WhiteHat Website Security Statistic Report Fall 2010, 10th Edition – Industry Benchmarks Executive Summary “How are we doing?” That’s the question on the mind of many executives and security practitioners whether

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2015-05-26 18:12:12
98Cross-platform software / Web application frameworks / Markup languages / Scripting languages / HTML5 / Drupal / Sass / JavaScript / JQuery / Software / Computing / Ajax

KENYON KOWAL DESIGNER / DEVELOPER kenyonkowal.comPortland, Oregon I have a passion for making the UI come alive, problem solving UX,

Add to Reading List

Source URL: kenyonkowal.com

Language: English - Date: 2014-10-23 17:52:30
99JavaScript / Web development / Ajax / Cross-platform software / Document Object Model / Cross-browser / Cross-site scripting / Web application / Unobtrusive JavaScript / Computing / Software / World Wide Web

PDF Document

Add to Reading List

Source URL: training.ukwda.org

Language: English - Date: 2012-09-08 06:04:53
100Computer network security / Software testing / Cross-site scripting / Web application security scanner / Vulnerability / Application security / Cross-site request forgery / Application firewall / SQL injection / Cyberwarfare / Computer security / Computing

PDF Document

Add to Reading List

Source URL: www.info-point-security.com

Language: English - Date: 2014-11-13 10:03:59
UPDATE