Software Development Security

Results: 957



#Item
51Software development / Computer security / Cyberwarfare / Software testing / Computer network security / Software Bill of Materials / Software development process / Software project management / Supply chain management / Vulnerability / Codenomicon / Patch

AppCheck Build a More Resilient World KEY APPCHECK FEATURES: • Scan Anything in Minutes

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
52Smartphones / Cross-platform software / Cloud storage / Cloud clients / Mobile operating systems / Mobile application development / Google Play / Cross-site request forgery / App store / Google Drive / Android / Mobile app

Indirect File Leaks in Mobile Applications Daoyuan Wu and Rocky K. C. Chang Department of Computing The Hong Kong Polytechnic University, Hung Hom, Kowloon, Hong Kong {csdwu, csrchang}@comp.polyu.edu.hk

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:45
53Computing / Software engineering / Software architecture / Web 2.0 / Computer network security / Web development / Web programming / JavaScript / Cross-site scripting / Web framework / World Wide Web / Rich Internet application

Report from Dagstuhl SeminarWeb Application Security Edited by Lieven Desmet1 , Martin Johns2 , Benjamin Livshits3 , and

Add to Reading List

Source URL: drops.dagstuhl.de

Language: English - Date: 2013-02-18 02:32:49
54Computing / Software / Web development / Computer network security / HTML / World Wide Web / JavaScript / Cross-site scripting / Cross-site request forgery / HTTP cookie / Browser security / OpenSocial

Talking to Strangers Without Taking Their Candy: Isolating Proxied Content Adrienne Felt, Pieter Hooimeijer, David Evans, Westley Weimer University of Virginia {felt, pieter, evans, weimer}@cs.virginia.edu

Add to Reading List

Source URL: www.cs.virginia.edu

Language: English - Date: 2008-03-19 15:40:17
55User interface techniques / Password / Security / Software / Form / Computing / Web development

Instructions for Application: Follow the link provided and you will be redirected to the Student Affairs Interview Days application. Once redirected, you will be prompted for a “user name” and “password” (located

Add to Reading List

Source URL: studentaffairs.uark.edu

Language: English - Date: 2015-10-05 09:19:39
56Computing / Web development / Software / Web design / HTML / News aggregators / Hacking / Cascading Style Sheets / JavaScript / Content Security Policy / Style sheet / HTTP cookie

Protecting Browsers from Cross-Origin CSS Attacks Lin-Shung Huang Zack Weinberg Carnegie Mellon University

Add to Reading List

Source URL: www.linshunghuang.com

Language: English - Date: 2015-08-17 01:18:54
57Computing / Business / Technology / Web development / Mashup / Software architecture / Web 2.0 / World Wide Web / Cryptography / National Security Agency / IBM / Web portal

PDF Document

Add to Reading List

Source URL: w2spconf.com

Language: English - Date: 2012-02-07 16:10:03
58Software / User interface techniques / Computing / System software / Web development / Software architecture / Web application / Browser security / Form / World Wide Web / Sandbox

PDF Document

Add to Reading List

Source URL: amitlevy.com

Language: English - Date: 2012-11-15 17:46:54
59System software / Android / Consumerization / Cloud computing / IOS / Sandbox / Rooting / Mobile application development / Rootkit / Computing / Smartphones / Software

in conjunction with the 18th ACM Conference on Computer and Communications Security (CCS) October, SWISSÔTEL Chicago, Chicago, IL Mobile devices such as smartphones and Internet tablets have achieved computin

Add to Reading List

Source URL: www.cs.ncsu.edu

Language: English - Date: 2011-06-01 10:34:31
UPDATE