Cross-site request forgery

Results: 270



#Item
131Computer network security / Software testing / Cross-site scripting / Vulnerability / OWASP / Cross-site request forgery / SQL injection / Code injection / HTTP cookie / Computer security / Cyberwarfare / Computing

An Overview of the 2013 OWASP Top 10 By Mike Sheward Lists are all over the Internet. Just yesterday I found myself wasting 12 minutes of my life reviewing ‘the 7 greatest Aston Villa kits of all time’. After a few m

Add to Reading List

Source URL: www.encription.co.uk

Language: English - Date: 2013-09-05 07:27:54
132Internet / Internet privacy / Computer network security / Domain name system / HTTP cookie / Key management / Cross-site request forgery / Session fixation / Session hijacking / Computing / Software / HTTP

Origin Cookies: Session Integrity for Web Applications Andrew Bortz Stanford University [removed]

Add to Reading List

Source URL: www.adambarth.com

Language: English - Date: 2011-05-30 16:56:21
133Uniform resource locator / World Wide Web / Internet standards / Email / Cross-site request forgery / Semantic URL attack / Email address / Cross-site scripting / Query string / Computing / Internet / URI schemes

,ch02.8451 Page 15 Thursday, September 29, 2005 2:14 PM Chapter 2 CHAPTER 2

Add to Reading List

Source URL: phpsecurity.org

Language: English - Date: 2009-12-16 13:33:16
134Cyberwarfare / Application firewall / Barracuda Networks / Cross-site scripting / Application security / OWASP / Web application security / Cross-site request forgery / SQL injection / Computer security / Computing / Computer network security

Barracuda Web Application Firewall Protects Against the Top 10 Biggest Web Site Threats White Paper

Add to Reading List

Source URL: www.barracuda.com

Language: English - Date: 2013-08-01 15:22:36
135Relational database management systems / Software testing / Data management / SQL / SQL injection / Hacking / Microsoft SQL Server / Cross-site request forgery / Password / Computing / Cyberwarfare / Computer security

Opening Intranets to attacks by using Internet Explorer Author:

Add to Reading List

Source URL: www.argeniss.com

Language: English - Date: 2009-04-09 10:09:42
136Data management / Cross-site scripting / Cross-site request forgery / Hacking / Software testing / Code injection / SQL injection / Vulnerability / Cyberwarfare / Computer security / Failure

Ben Livshits and Úlfar Erlingsson Microsoft Research  Web application vulnerabilities more common

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2007-06-17 22:39:28
137Computing / Cross-site scripting / Cross-site request forgery / Penetration test / Websense / Web application security / Phishing / Internet security / Malware / Computer network security / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.auscert.org.au

Language: English - Date: 2014-11-14 18:53:19
138World Wide Web / Cross-site scripting / JavaScript / Document Object Model / Cross-site request forgery / Form / HTTP cookie / Web application / Password / Computing / Software / HTML

IT SecurITy Protected Web Components: Hiding Sensitive Information in

Add to Reading List

Source URL: computingnow.computer.org

Language: English - Date: 2015-01-19 17:04:00
139ITER / Knowledge / Science / Academia / Cross-site request forgery / Peer review / Framework Programmes for Research and Technological Development

CURTIN SARAWAK RESEARCH FUND

Add to Reading List

Source URL: www.curtin.edu.my

Language: English - Date: 2013-11-20 21:08:42
140Password / Cross-site request forgery / Cryptographic software / Password manager / Features of the Opera web browser / Software / System software / Computing

Centercode Platform Security Overview

Add to Reading List

Source URL: www2.centercode.com

Language: English - Date: 2015-03-31 00:42:08
UPDATE