Copyright © 2009 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © 2007 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Copyright © 2005 - The OWASP Foundation Permission is granted to copy, distribute and/or modify this document under the terms of the GNU Free Documentation.
Encoded Attacks And Countermeasures
I'm in ur browser, pwning your stuff - Attacking (with) Google Chrome Extensions
Web Application Security Strategy
Sigurnosne prijetnje i mjere zaštite IT infrastrukture
OWASP Serbia - A6 security misconfiguration
Computer forensic 101 - OWASP Khartoum
OWASP Top 10 Web Application Vulnerabilities
Web 2.0 threats, vulnerability analysis,secure web 2.0 application development and risk management
Advanced sql injection