Cross-application scripting

Results: 523



#Item
481Functional languages / Racket / Scripting languages / Web application frameworks / Read–eval–print loop / JavaScript / How to Design Programs / Google Chrome / Web application / Computing / Software / Cross-platform software

WeScheme: The Browser is Your Programming Environment Danny Yoo Emmanuel Schanzer

Add to Reading List

Source URL: hashcollision.org

Language: English - Date: 2012-01-17 18:23:27
482Security / Software testing / CCWAPSS / National security / Penetration test / Password / Vulnerability / OWASP / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

Common Criteria Web Application Security Scoring - CCWAPSS 1.1

Add to Reading List

Source URL: www.xmcopartners.com

Language: English - Date: 2012-05-09 06:44:16
483Computer network security / Software testing / Hacking / Cross-site scripting / Application security / Web application security scanner / Vulnerability / Web application security / JavaScript / Cyberwarfare / Computer security / Computing

NTOSpider Web Application Security Scanner with Universal Translator Technology Building and managing an application security program is no simple feat. Most security teams today are responsible for

Add to Reading List

Source URL: www.ntobjectives.com

Language: English - Date: 2014-05-15 16:43:37
484High-level programming languages / Scripting languages / GPGPU / CUDA / Graphics hardware / Python / Linux / Perl / Application programming interface / Computing / Software / Cross-platform software

Thanassis Tsiodras B [removed] Í ttsiodras.github.io Education

Add to Reading List

Source URL: users.softlab.ece.ntua.gr

Language: English - Date: 2014-01-05 18:15:39
485Software / Cross-platform software / IBM software / REXX / ISPF / É / Z/OS / Grave accent / Batch file / Command shells / Scripting languages / Computing

ISPF Application Development Michel Castelein - Arcis Services 15 March[removed]removed]

Add to Reading List

Source URL: users.skynet.be

Language: English - Date: 2010-03-15 07:14:45
486Scripting languages / PHP / Cross-platform software / Web application frameworks / Zend Framework / Zend Studio / JQuery / JavaScript / Apache Subversion / Software / Computing / PHP programming language

Joseph V. Crawford Jr. PO Box[removed]Adams, MA[removed]Phone: [removed]E-Mail: [removed] SUMMARY Offering extensive experience with very high traffic websites using PHP 4, PHP 5 and MySQL. Self-motivat

Add to Reading List

Source URL: www.josephcrawford.com

Language: English - Date: 2012-11-04 14:15:31
487Scripting languages / PHP / Cross-platform software / Web application frameworks / Zend Framework / Zend Studio / JQuery / JavaScript / Apache Subversion / Software / Computing / PHP programming language

Joseph V. Crawford Jr. PO Box[removed]Adams, MA[removed]Phone: [removed]E-Mail: [removed] SUMMARY Offering extensive experience with very high traffic websites using PHP 4, PHP 5 and MySQL. Self-motivat

Add to Reading List

Source URL: www.josephcrawford.com

Language: English - Date: 2012-11-04 14:15:29
488Scripting languages / Cross-platform software / Adobe Flash / ActionScript / Adobe Creative Suite / JQuery / JavaScript / Software / Computing / Application software

4717 Cambridge Trace Dunwoody, Georgia[removed]http://www.raharja.net[removed]home[removed]mobile)

Add to Reading List

Source URL: www.raharja.net

Language: English - Date: 2010-06-21 11:34:03
489Web 2.0 / Cross-platform software / Graphics file formats / Web development / JavaScript / Cross-site scripting / Adobe Flash / SWF / Dashboard / Software / Computing / Software architecture

Microsoft Word - Web-Application-Security

Add to Reading List

Source URL: www.virtualsecrets.com

Language: English - Date: 2009-05-08 00:51:46
490Computer network security / Electronic commerce / Software testing / Credit cards / Application security / Application firewall / Cross-site scripting / Vulnerability / Web application security / Computer security / Cyberwarfare / Computing

Securing Enterprise Web Applications for Critical Data Protection and PCI-DSS Compliance Selecting the Right Technology is Essential in Guarding Against Malicious Attacks White_Paper

Add to Reading List

Source URL: www.ict.com.qa

Language: English - Date: 2013-12-02 14:46:59
UPDATE