OWASP New Zealand 2010 July 15, 2010 to July 15, 2010, New Zealand
Tell us about missing data
Tell us about missing data
Title | Speakers | Summary | Topic Types |
---|---|---|---|
Low Scuttling Chilli Crab:Network Recon 2010Ad | Metlstorm | Network reconnaissance is an art as old as hacking, but the days of dumpster diving ... | Security Infrastructure Web Analysis |
The Ramblings Of An Ex-Qsa | Deancarter Carter | As a QSA there were a bunch of things Dean was forbidden from discussing. As ... | Security Deep Knowledge Compliance |
Security-Assessment.Com - Oh F#!K : What To Do When You Get Pwned | Paul Craig | If your company’s website were hacked tomorrow, would you know what to do? Forensics is ... | Security Incident Response Computer Forensics Analysis Forensics |
Insomnia Security - Don'T Try This At Home | Brett Moore | During source code and application reviews a number of common issues are often seen. Developers ... | Security Deep Knowledge |
Aura Software Security / Xero - Tales From The Crypt0 | Graeme Neilson , Kirk Jackson | Does the thought of SSL, HTTPS and S/MIME make you squeamish? Does PKI make you ... | Security Others Cryptography |
Sitehost / Web Drive - Hosting And Web Apps - The Obscurity Of Security | Quintin Russ , Mike Jager | The security of web applications has traditionally been considered to be the problem of the ... | Security Web Application Security |
Defending Against Application Level Dos Attacks | Roberto Suggi Liverani | Secure code practices, system hardening, due diligence and due care principles are paramount in mitigating ... | Security Intrusion Detection Application Security |