Vídeos de la AppSec USA 2012
Para que no te aburras este fin de semana y después de que hayas visto Er docu der finde, aquí tenéis el listado de los vídeos de la AppSec USA 2012 celebrada en Austin, Texas.
- Keynote - Securing Javascript - Douglas Crockford
- Cracking the Code of Mobile Application - Sreenarayan Ashokkumar
- Put Your Robots to Work: Security Automation at Twitter - Justin Collins, Neil Matatall, Alex Smolen
- Incident Response: Security After Compromise - Richard Bejtlich
- Exploiting Internal Network Vulns via the Browser using BeEF Bind - Michele Orru
- Web App Crypto - A Study in Failure - Travis H.
- Reverse Engineering Secure HTTP API's With an SSL Proxy - Alejandro Caceres and Mark Haase
- Gauntlt: Rugged by Example - Jeremiah Shirk, Mani Tadayon, James Wickett
- Effective Approaches to Web Application Security - Zane Lackey
- Building a Web Attacker Dashboard with ModSecurity and BeEF - Ryan Barnett
- Bug Bounty Programs - Michael Coates, Chris Evans, Jeremiah Grossman, Adam Mein, Alex Rice
- Four Axes of Evil - HD Moore
- Cross Site Port Scanning - Riyaz Walikar
- Top Ten Web Defenses - Jim Manico
- Keynote - Some Lessons from the Trenches- Michael Howard
- Hacking with Web Sockets - Vaagn Toukharian
- I>S+D! - Interactive Application Security Testing(IAST), Beyond SAST/DAST - Ofer Maor
- The Same-Origin Saga - Brendan Eich
- Real World Cloud Application Security - Jason Chan
- XSS & CSRF with HTML5 - Attack, Exploit and Defense - Shreeraj Shah
- Keynote- The State of OWASP - Tom Brennan, Michael Coates, Seba Deleersnyder, Eoin Keary, Matt Tesauro, David Wichers
- Analyzing and Fixing Password Protection Schemes - John Steven
- Unraveling Some of the Mysteries around DOM-Based XSS - Dave Wichers
- Mobile Applications & Proxy Shenanigans - Dan Amodio and David Linder
- The Application Security Ponzi Scheme: Stop Paying For Security Failure - Jarret Raim and Matt Tesauro
- Web Framework Vulnerabilties - Abraham Kang
- AppSec Training, Securing the SDLC, WebGoat.NET and the Meaning of Life - Jerry Hoff
- Keynote-InfoSec at Ludicrious Speed: Rugged DevOps and More - Gene Kim
- Builders vs. Breakers - Brett Hardin, Matt Konda, Jon Rose
- Get Off Your AMF and Don't REST on JSON - Dan Kuykendall
- Rebooting (Secure) Software Development with Continuous Deployment - Nick Galbreath
- SQL Server Exploitation, Escalation and Pilfering - Antti Rantasaari and Scott Sutherland
- Secure Code Reviews Magic or Art? A Simplified Approach to Secure Code Reviews - Sherif Koussa
- How We Tear Into That Little Green Man - Matthew Rowley
- Blended Threats and JavaScript: A Plan for Permanent Network Compromise - Phil Perviance
- Hack your way to a degree: a new direction in teaching application security at universities - Konstantinos Papapanagiotou
- Using Interactive Static Analysis for Early Detection of Software Vulnerabilities - Bill Chu
- Security at Scale - Yvan Boily
- Origin(al) Sins - Alex Russell
- Counterintelligence Attack Theory - Fred Donavan
- WTF - WAF Testing Framework - Yaniv Azaria and Amichai Shulman
- Hacking .NET Applications: Reverse Engineering 101 - Jon McCoy
- The 7 Qualities of Highly Secure Software, Mano Paul
- Iran's Real Life Cyberwar - Phillip Hallam-Baker
- Unbreakable Oracle ERPs? Attacks on Siebel & JD Edwards - Juan Perez-Etchegoyen and Jordan Santarsieri
- Demystifying Security in the Cloud: AWS Scout - Jonathan Chittenden
- NoSQL, No Security? - Will Urbanski
- Pining for the Fjords: The Role of RBAC in Today's Applications - Wendy Nather
- Doing the Unstuck: How Rugged Cultures Drive Biz & AppSec Value - Josh Corman
- DevOps Distilled: The Devops Panel - Josh Corman, Nick Galbreath, Gene Kim, David Mortman, James Wickett
- Spin the Bottle: Coupling Technology and SE For One Awesome Hack - Dave Kennedy
- Building Predictable Systems Using Behavioral Security Modeling: Functional Security Requirements - John Benninghoff
- The Diviner - Digital Clairvoyance Breakthrough - Gaining Access to the Source Code & Server Side Memory Structure - Shay Chen
- The Magic of Symbiotic Security: Creating an Ecosystem of Security Systems - Dan Cornell and Josh Sokol
- Securing the SSL channel against man-in-the-middle attacks - Tobias Gondrom
Buscar
Entradas Recientes
- Posts
- Reemplazando la bateria del AirTag
- OpenExpo Europe décima edición, 18 de mayo: El Epicentro de la Innovación y la Transformación Digital
- Docker Init
- Kubernetes para profesionales
- Agenda: OpenExpo Europe 2022 llega el 30 de junio en formato presencial
- Libro 'Manual de la Resilencia', de Alejandro Corletti, toda una referencia para la gestión de la seguridad en nuestros sistemas
- Mujeres hackers en ElevenPaths Radio
- Creando certificados X.509 caducados
- Generador de imágenes Docker para infosec