-
1
-
-
51449088053
-
-
4th language in the TPCI, March 2007 http://www.tiobe.com/tpci.htm
-
4th language in the TPCI, March 2007 http://www.tiobe.com/tpci.htm
-
-
-
-
3
-
-
51449119279
-
-
Ajax Technologies
-
Ajax Technologies, http://adaptivepath.com/publications/essays/archives/ 000385.php
-
-
-
-
4
-
-
51449084936
-
-
Ajax Worms, http://www.whitehatsec.com/downloads/WHXSSThreats.pdf
-
Ajax Worms
-
-
-
5
-
-
51449086013
-
-
Sean Barnum, Amit Sethi, Attack Pattern Glossary, in Build Security In. https://buildsecurityin.uscert.gov/daisy/bsi/articles/knowledge/attack/590.pdf
-
Sean Barnum, Amit Sethi, Attack Pattern Glossary, in Build Security In. https://buildsecurityin.uscert.gov/daisy/bsi/articles/knowledge/attack/590.pdf
-
-
-
-
6
-
-
51449103004
-
-
Cenzic Hailstorm http://www.cenzic.com/products_services/ cenzic_hailstorm.php
-
Cenzic Hailstorm
-
-
-
10
-
-
39749125095
-
Web Application Scanners: Definitions and Functions
-
Jan 3-6, Hawaii, USA
-
E. Fong and V. Okun, "Web Application Scanners: Definitions and Functions," in Proceedings of HICSS-40 Conference, Jan 3-6, 2007, Hawaii, USA.
-
(2007)
Proceedings of HICSS-40 Conference
-
-
Fong, E.1
Okun, V.2
-
11
-
-
51449084269
-
-
Jeremiah Grossman, The Five Myths of Web Application Security, WhiteHat Security, Inc, 2005.
-
Jeremiah Grossman, The Five Myths of Web Application Security, WhiteHat Security, Inc, 2005.
-
-
-
-
12
-
-
51449083395
-
-
Shanit Gupta, Foundstone Hacme Bank v. 2.0 Software Security Training Application, April 2006, http://www.foundstone.com/resources/whitepapers/ hacmebank_userguide2.pdf
-
Shanit Gupta, Foundstone Hacme Bank v. 2.0 Software Security Training Application, April 2006, http://www.foundstone.com/resources/whitepapers/ hacmebank_userguide2.pdf
-
-
-
-
15
-
-
51449099050
-
-
National Vulnerability Database NVD
-
National Vulnerability Database (NVD), http://nvd.nist.gov/
-
-
-
-
16
-
-
51449108368
-
-
National Institute of Standards and Technology (NIST), quot;Engineering Principles for Information Technology Security (A Baseline for Achieving Security)quot;, NIST SP 800-27, Revision A, June 2004, http://csrc.nist.gov/publications/nistpubs/
-
National Institute of Standards and Technology (NIST), "quot;Engineering Principles for Information Technology Security (A Baseline for Achieving Security)"quot;, NIST SP 800-27, Revision A, June 2004, http://csrc.nist.gov/publications/nistpubs/
-
-
-
-
17
-
-
51449118658
-
-
OWASP, Top Ten Project
-
OWASP, Top Ten Project, http://www.owasp.org/index.php/ OWASP_Top_Ten_Project
-
-
-
-
18
-
-
51449106555
-
-
OWASP, Pantera Web Assessment Studio Project
-
OWASP, Pantera Web Assessment Studio Project, http://www.owasp.org/index. php/Category:OWASP_Pantera_Web_Assessment_Studio_Project
-
-
-
-
19
-
-
51449088671
-
-
OWASP Site Generator Project
-
OWASP Site Generator Project, http://www.owasp.org/index.php/ Owasp_SiteGenerator
-
-
-
-
20
-
-
51449121899
-
-
OWASP, WebGoat Project
-
OWASP, WebGoat Project, http://www.owasp.org/software/webgoat.html.
-
-
-
-
21
-
-
51449106969
-
-
Prescatore, John, Gartner, quoted in Computerworld, Feb 25, 2005. http://www.computerworld.com/printhis/2005/0,4814,99981,00.html
-
Prescatore, John, Gartner, quoted in Computerworld, Feb 25, 2005. http://www.computerworld.com/printhis/2005/0,4814,99981,00.html
-
-
-
-
23
-
-
51449106130
-
-
SAMATE project Web Application Scanners
-
SAMATE project Web Application Scanners, http://samate.nist.gov/index. php/Web_Application_Vulnerability_Scanners
-
-
-
-
24
-
-
51449105924
-
-
SpiDynamics, WebInspect http://www.spidynamics.com/products/webinspect/ index.html
-
WebInspect
-
-
-
25
-
-
39749162348
-
-
Web Application Security Consortium, WASC
-
Web Application Security Consortium, WASC, "Threat Classification," http://www.webappsec.org/projects/threat/
-
Threat Classification
-
-
-
26
-
-
51449115935
-
-
Watchfire, AppScan http://www.watchfire.com/products/appscan/default.aspx
-
AppScan
-
-
|