Understanding OpenID

Prabath Siriwardena 15 years ago

Cours CyberSécurité - Concepts Clés

Franck Franchin 11 years ago

Presentation sso design_security

Marco Morana 12 years ago

Threat Modeling web applications (2012 update)

Antonio Fontes 12 years ago

Modéliser les menaces d'une application web

Antonio Fontes 11 years ago

Top Ten Web Hacking Techniques (2010)

Jeremiah Grossman 13 years ago

Cyber-attaques: mise au point

Antonio Fontes 13 years ago

OWASP Mobile Top10 - Les 10 risques sur les mobiles

Sébastien GIORIA 12 years ago

Meet the OWASP

Antonio Fontes 12 years ago

Rapid Threat Modeling : case study

Antonio Fontes 12 years ago

Protection des applications Web avec OpenAM

Ludovic Poitou 12 years ago

Web application security: how to start?

Antonio Fontes 14 years ago

Monitoring 101

Yan Luong 12 years ago

Application Threat Modeling

Rochester Security Summit 13 years ago

Web Application Frewall

Abhishek Singh 17 years ago

OWASP Top10 2013 - Présentation aux RSSIA 2013

Sébastien GIORIA 10 years ago

Réputation et industrialisation

Julien PIERRE 10 years ago

2013 03-01 automatiser les tests sécurité

Sébastien GIORIA 11 years ago