[OWASP-Bulgaria] G. Geshev - Web Application Firewalls from an Attacker's Perspective
HTTP Parameter Pollution
Owasp top 10 2010 Resist toulouse
Creating, obfuscating and analyzing malware JavaScript
Tworzenie, zaciemnianie i analiza złośliwego kodu JavaScript
Jak ocalić swoje dane przed SQL injection?
Android reverse engineering: understanding third-party applications. OWASP EU Tour 2013 Bucharest (Romania)
Android in the healthcare workplace
Copyright © 2006 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
The OWASP Foundation Copyright © The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under.
Copyright © 2006 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the Creative Commons Attribution-ShareAlike.
© 2009 - S.Gioria & OWASP Copyright © 2009 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms.