The Art of Software Security Assessment
Continued ramblings on software security and code auditing ... I always find these types of bugs interesting because they require such unique ...
http://taossa.com/
popularity:
security
blog
programming
software
auditing
code
books
research
blogs
book
|
Matasano Security LLC - Chargen
Helping developers and enterprises secure their code is what we do. ... To learn more about Playbook, check out the site, or get in touch with us via ...
similarity:
popularity:
security
blog
programming
networking
documentation
matasano
blogs
privacy
reverse-engineering
work
|
TaoSecurity
OpenPacket-users Mailing List https://lists.sourceforge.net/lists/listinfo/openpacket ... TaoSecurity Blog http://taosecurity.blogspot.com. Welcome! C'mon in. ...
similarity:
popularity:
security
blog
network
blogs
freebsd
infosec
networking
sysadmin
bsd
linux
|
DoxPara Research
Features Paketto Keiretsu: a set of utilities for doing odd things to TCP/IP networks by "stretching the protocols ... Staring Into The Abyss dan@doxpara.com ... (such as www.doxpara.com) to numbers the ...
similarity:
popularity:
security
dns
hacking
blog
network
research
internet
software
tools
vulnerability
|
Main Page - OWASP
Developing software tools and knowledge based documentation that helps people secure web applications and web services.
similarity:
popularity:
security
web
programming
opensource
development
hacking
internet
application
webdev
software
|
CWE - 2010 CWE/SANS Top 25 Most Dangerous Programming Errors
http://cwe.mitre.org/top25. 2009 CWE/SANS Top 25 Most Dangerous Programming Errors ... (CWE) (http://cwe.mitre.org/). MITRE maintains the CWE web site, with the ...
similarity:
popularity:
security
programming
software
development
vulnerabilities
reference
errors
testing
web
vulnerability
|
Coding Horror
Programming and human factors by Jeff Atwood.
similarity:
popularity:
programming
blog
development
software
coding
blogs
design
code
technology
.net
|
Schneier.com
Renowned security technologist and author.
similarity:
popularity:
security
cryptography
blog
technology
privacy
crypto
encryption
blogs
people
schneier
|
Security to the Core | Arbor Networks Security Blog
Effectively Completing the Attack (and this posting) ... This is a Flickr badge showing public photos from arbor.asert. Make your own badge here. ...
similarity:
popularity:
security
blog
network
research
blogs
hacking
arbor
news
networking
vendor
|
hackademix.net - Giorgio Maone's answers to the Web, the Universe, and Everything
hackademix.net. Giorgio Maone's answers to the Web, the Universe, and Everything. Home ... Posted by: Giorgio in ABE, CSRF, Mozilla, Security, NoScript ...
similarity:
popularity:
security
hacking
blog
web
programming
hacks
news
java
blogs
internet
|
ha.ckers.org web application security lab
Then she saw the ha.ckers.org logo, to which I said, "Don't worry, we were just ... So you've seen ha.ckers.org on Google's own machines at a security conference - where ...
similarity:
popularity:
security
hacking
blog
web
programming
internet
tools
reference
hack
xss
|