Cross-application scripting

Results: 523



#Item
421Computing / Software testing / Hacking / Electronic commerce / Cross-site scripting / Application security / Vulnerability / Exploit / Web application security / Computer security / Cyberwarfare / Computer network security

… White paper Web Application Security: GamaSec Solution 1. Web Applications: An attractive target How do you cost effectively defend web applications from attack? Your organization relies on

Add to Reading List

Source URL: www.alentus.com

Language: English - Date: 2011-04-06 12:15:34
422Software testing / Failure / Vulnerability / Attack patterns / Common Vulnerabilities and Exposures / CWE / Common Weakness Enumeration / Cross-site scripting / Application security / Cyberwarfare / Computer security / Hacking

Studying Software Vulnerabilities Dr. Robin A. Gandhi, Dr. Harvey Siy, and Yan Wu The University of Nebraska at Omaha M

Add to Reading List

Source URL: www.crosstalkonline.org

Language: English - Date: 2010-10-29 15:34:06
423Scripting languages / Distributed computing architecture / Software architecture / Cross-platform software / JavaScript / JQuery / MongoDB / Web development / Web application / Software / Computing / Ajax

Geoffrey Booth front-end and back-end web developer passionate about creating elegant user experiences[removed]removed]

Add to Reading List

Source URL: www.geoffreybooth.com

Language: English - Date: 2014-09-02 19:57:25
424Cross-platform software / Scripting languages / JavaScript / Clojure / Web application frameworks / Ajax / Java / Ruby on Rails / Dojo Toolkit / Computing / Software / Computer programming

Lisp in Summer Projects Submission Submission Date[removed]:06:30 Full Name

Add to Reading List

Source URL: lispinsummerprojects.org

Language: English - Date: 2014-07-29 16:18:58
425Graphics file formats / Web development software / Adobe Flash / Animation software / Vulnerability / Adobe AIR / Cross-site scripting / Adobe Systems / Rich Internet application / Software / Computing / Cross-platform software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-04-10 17:08:20
426Cross-platform software / Scripting languages / Relational database management systems / Software testing / Database management systems / Vulnerability / Cross-site scripting / Code injection / SQL injection / Computing / Software engineering / Computer programming

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: people.csail.mit.edu

Language: English
427Cross-platform software / JavaScript / Password / Games / World of Warcraft / Software / Scripting languages / Computing

Property Updater FAQs What is the Property Listing Updater? The Property Updater is a password-protected application, accessible through Apartments.com, which allows advertisers to change all aspects of their premium ad(

Add to Reading List

Source URL: advertise.apartments.com

Language: English - Date: 2013-10-22 14:04:53
428Cross-platform software / Ajax / Web application frameworks / Java platform / Mobile application development / JavaScript / Java / ASP.NET / Esri / Computing / Software / Scripting languages

Position Description: Application Developer / UI Specialist Position Description Application developer with experience developing sophisticated Web, Mobile and Desktop applications using a combination of open source, co

Add to Reading List

Source URL: www.imagemattersllc.com

Language: English - Date: 2013-06-26 12:52:49
429Google Chrome / HTTP / Sandbox / XMLHttpRequest / Same origin policy / Web application / Firefox / PhoneGap / Cross-site scripting / Software / Ajax / Cross-site request forgery

X-­‐Excess   WebApps  meet  Na1veApps     Mike  Haworth,  AuraInfosec   Kirk  Jackson,  AuraInfosec  (re1red)  

Add to Reading List

Source URL: www.aurainfosec.com

Language: English - Date: 2014-05-08 23:39:32
430Computer network security / Penetration test / Cross-site scripting / Information security / Threat / Computer insecurity / Vulnerability / Application security / Malware / Security / Cyberwarfare / Computer security

The following are major trends within information security and some of their implications for state government

Add to Reading List

Source URL: www.oregon.gov

Language: English - Date: 2012-02-28 20:43:14
UPDATE