OWASP O2 Platform - Open Platform for Automating Application Security Knowledge and Workflows (English)
- New search for: Cruz, D.
- New search for: Cruz, D.
- New search for: Serrao, C.
- New search for: Aguilera, V.
- New search for: Cerullo, F.
In:
Iberic Web Application Security Conference; IBWAS 2009
72
;
5-6
;
2011
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:OWASP O2 Platform - Open Platform for Automating Application Security Knowledge and Workflows
-
Contributors:
-
Conference:Iberic Web Application Security Conference; IBWAS 2009 ; 2009 ; Madrid, Spain
-
Published in:
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin , London
-
Publication date:2011-01-01
-
Size:2 pages
-
Remarks:Includes bibliographical references and index
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
The OWASP Logging ProjectChisinevski, M. et al. | 2011
- 3
-
SQL Injection - How Far Does the Rabbit Hole Go?Clarke, J. et al. | 2011
- 5
-
OWASP O2 Platform - Open Platform for Automating Application Security Knowledge and WorkflowsCruz, D. et al. | 2011
- 7
-
The Business of RoguewareCorrons, L. et al. | 2011
- 9
-
Microsoft Infosec Team: Security Tools RoadmapRoses, S. et al. | 2011
- 11
-
Empirical Software Security AssuranceHarper, D. et al. | 2011
- 13
-
Assessing and Exploiting Web Applications with the Open-Source Samurai Web Testing FrameworkSiles, R. et al. | 2011
- 15
-
Authentication: Choosing a Method That FitsAlmeida, M. et al. | 2011
- 17
-
Cloud Computing: Benefits, Risks and Recommendations for Information SecurityCatteddu, D. et al. | 2011
- 19
-
OWASP TOP 10 2009Cerullo, F.E. et al. | 2011
- 21
-
Deploying Secure Web Applications with OWASP ResourcesCerullo, F.E. et al. | 2011
- 23
-
Thread Risk ModellingKnobloch, M. et al. | 2011
- 25
-
Protection of Applications at the Enterprise in the Real World: From Audits to ControlsFernandez-Snaguino, J. et al. | 2011
- 27
-
A Semantic Web Approach to Share Alerts among Security Information Management Systemsde Vergara, J.E.L. / Villagra, V.A. / Holgado, P. / de Frutos, E. / Sanz, I. et al. | 2011
- 39
-
WASAT - A New Web Authorization Security Analysis ToolTorrano-Gimenez, C. / Perez-Villegas, A. / Alvarez, G. et al. | 2011
- 51
-
Connection String Parameter Pollution AttacksAlonso, C. / Fernandez, M. / Martin, A. / Guzman, A. et al. | 2011
- 63
-
Web Applications Security Assessment in the Portuguese World Wide Web PanoramaTeodoro, N. / Serrao, C. et al. | 2011
- 75
-
Building Web Application Firewalls in High Availability EnvironmentsLara, J.G. / Gracia, A.P. et al. | 2011