Cross-application scripting

Results: 523



#Item
181Microsoft Word - CCN02CEJSRFPR1101 _CourseOutline.doc

Microsoft Word - CCN02CEJSRFPR1101 _CourseOutline.doc

Add to Reading List

Source URL: www.ciwcertified.com

Language: English - Date: 2012-03-06 09:22:26
182Microsoft Word - CCN02CEJSRFPR1101 _CourseOutline.doc

Microsoft Word - CCN02CEJSRFPR1101 _CourseOutline.doc

Add to Reading List

Source URL: www.ciwcareeracademy.com

Language: English - Date: 2014-06-11 17:35:43
183Colorado Software Summit: October 21 – 26, 2007  © Copyright 2007, Contecon Software GmbH Groovy A Language Introduction for Java Programmers

Colorado Software Summit: October 21 – 26, 2007 © Copyright 2007, Contecon Software GmbH Groovy A Language Introduction for Java Programmers

Add to Reading List

Source URL: www.softwaresummit.com

Language: English - Date: 2008-08-14 23:42:33
184SWAT PRODUCT BROCHURE  WEB APPLICATION SECURITY Web application security has been a huge challenge for companies during the last couple of years since there are very few competent solutions available in the market. The

SWAT PRODUCT BROCHURE WEB APPLICATION SECURITY Web application security has been a huge challenge for companies during the last couple of years since there are very few competent solutions available in the market. The

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2014-12-15 07:24:52
185Source Code Analysis Made Easy  The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

Source Code Analysis Made Easy The Web AppSec How-to: The Defenders’ Toolbox Web application security has made headline news in the past few years. Incidents such as the targeting of specific sites as a channel to dis

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:13:21
186SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
187DRMAA: Distributed Resource Management Application API Hrabri Rajic, Intel Daniel Templeton, Sun Microsystems Peter Tröger, University of Potsdam

DRMAA: Distributed Resource Management Application API Hrabri Rajic, Intel Daniel Templeton, Sun Microsystems Peter Tröger, University of Potsdam

Add to Reading List

Source URL: www.troeger.eu

Language: English - Date: 2014-10-11 15:47:33
188THE PROJECTS  Razum d.o.o. Gozdna pot 7, 1000 Ljubljana, SLOVENIA  www.razum.si

THE PROJECTS Razum d.o.o. Gozdna pot 7, 1000 Ljubljana, SLOVENIA www.razum.si

Add to Reading List

Source URL: www.razum.si

Language: English - Date: 2014-03-10 17:57:26
189MARK SMITH camazotz llc | github | linkedin Accomplished software engineer with an exceptional track record helping startups and small companies deliver successful consumer and business applications. Focus on system arch

MARK SMITH camazotz llc | github | linkedin Accomplished software engineer with an exceptional track record helping startups and small companies deliver successful consumer and business applications. Focus on system arch

Add to Reading List

Source URL: camazotz.com

Language: English - Date: 2014-10-13 09:22:32
190Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19