The Art of Software Security Assessment
Continued ramblings on software security and code auditing ... I always find these types of bugs interesting because they require such unique ...
http://taossa.com/
popularity:
security
blog
programming
software
auditing
code
books
research
blogs
book
|
Joel on Software
UI design writer and software developer writing about software development.
similarity:
popularity:
blog
software
programming
development
blogs
management
tech
technology
business
design
|
SecuriTeam Blogs
SecuriTeam Home. Elance user information compromised ... Virus (210) Web (379) Zoned Out (4) Meta. Login. SecuriTeam Blogs is powered by Word Press. ...
similarity:
popularity:
security
blog
blogs
hacking
infosec
news
daily
linux
sysadmin
windows
|
Jeremiah Grossman
One of the things that makes Black Hat so friggin' awesome is the quality of the ... Bleeding-edge material, theoretical and applicable, seen no where else covering ...
similarity:
popularity:
security
blog
hacking
web
javascript
blogs
css
ajax
xss
hack
|
Jeff Jonas
A collection of thoughts on information management and privacy in the information age, injected with a few personal stories.
similarity:
popularity:
blog
security
datamining
privacy
surveillance
semantic
identity
information
blogs
software
|
Moxie Marlinspike >> Thoughtcrime Labs
About Me Software Stories "..now yea be learnin' the value of a lobster, ain't yea, young yachtsman? ...
similarity:
popularity:
security
hacking
software
blog
ssl
anarchism
anarchy
tools
culture
programming
|
Welcome to iDefense Labs -- Managed Security Services and Information Security for Government and Fortune 500 Organizations // iDefense Labs
VeriSign iDefense services deliver comprehensive, actionable intelligence regarding network-based security threats and vulnerabilities which can help organizations ...
similarity:
popularity:
security
research
hacking
software
infosec
reference
internet
utilities
programming
idefense
|
Chris Shiflett: PHP and Web Application Security
A PHP author, blogger, and speaker. ... show my support for web standards, and to show off the design of shiflett.org: The i...
similarity:
popularity:
php
security
blog
programming
web
webdev
blogs
webdesign
inspiration
development
|
Didier Stevens
I did some research and discovered that Adobe implemented a blacklist ... but that the blacklisting functionality identifies the file type of "cmd.exe" as. ...
similarity:
popularity:
security
blog
forensics
hacking
pdf
blogs
windows
malware
computers
research
|
ThePCSpy.com
If you've been here before, you've probably noticed that things look ... Recently released, Ubuntu Lucid Lynx makes a lot of core improvements but in my ...
similarity:
popularity:
technology
security
blog
pc
tips
tech
blogs
software
programming
hardware
|
securosis.com
The Business Justification for Data Security. Building a Web Application Security Program. Securosis: On Holiday. Database Security: The Other First Steps ...
similarity:
popularity:
security
blog
technology
mac
sysadmin
networking
network
osx
infosec
blogs
|