OWASP 2016 (Europe) 作者: Hack Inn 时间: August 5, 2016 分类: 安全大会资料 访问: 1,388 次 #### 1、[Compression Bombs Strike Back](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Giancarlo-Pellegrino-Compression-Bombs.pdf) #### 2、[Leveling an Application ecurity Program](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-David-Rook-Leveling-an-Application-Security-Program.pdf) #### 3、[Building secure cloud-native apps with spring boot & security](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Andreas-Falk-Building-Native-Cloud-Apps.pdf) #### 4、[The Tales of a Bug Bounty Hunter](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Arne-Swinnen-Tales-of-a-Bug-Bounty-Hunter.pdf) #### 5、[Using Third Party Components for Building an Application Might be More Dangerous Than You Think!](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Achim-Brucker-Using-Third-Party-Components.pdf) #### 6、[The Timing Attacks They Are A-Changin](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Tom-Van-Goethem-The-Timing-Attacks-They-Are-A-Changin.pdf) #### 7、[Making OpenSAMM More Effective in a DevOps World](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-John-Dickson-Making-OpenSAMM-More-Effective.pdf) #### 8、[Automated Mobile Application Security Testing with Mobile Security Framework](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Ajin-Abraham-Automated-Mobile-Assessment.pdf) #### 9、[Using JIRA to manage Risks and Security Champions activities](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Dinis-Cruz-Using-Jira-To-Manage-Risks.pdf) #### 10、[Systematically Breaking and Fixing OpenID Connect](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Christian-Mainka-Breaking-And-Fixing.pdf) #### 11、[Tactial Insights for Managers](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Tobias-Gondrom-Ciso-Survey.pdf) #### 12、[Open Source Approaches to Security for Applications and Services at Mozilla](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Adam-Muntner-Open-Source-Approaches-to-Security.pdf) #### 13、[Tell me stories about your appsec, let's skip the pentest](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Timur-Khrotko-Lets-Skip-The-Pentest.pdf) #### 14、[Automate all the AppSec](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Aaron-Weaver-Pipeline-Automation.pdf) #### 15、[ABCs of Source-Assisted Web Application Penetration Testing with OWASP ZAP](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Dan-Cornell-Source-Assisted-PenTesting.pdf) #### 16、[Using the Open API Specification to find first and second order vulnerabilities in RESTful APIs](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Scott-Davis-Scanning-with-Swagger.pdf) #### 17、[How to be Agile in Security Testing Projects](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Simone-Onofri-Security-Project-Management.pdf) #### 18、[SAASy SPLC](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Julia-Knecht-SAASy-SPLC.pdf) #### 19、[Addressing Security Requirements in Development Projects](https://data.hackinn.com/ppt/2016owasp/1/AppSecEU2016-Daniel-Kefer-Addressing-Security-Requirements.pdf) #### 20、[Grip on Secure Software Development](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Rob-Van-Der-Veer-GriponSSD.pdf) #### 21、[Practical Attacks on Real World Crypto Implementations](https://data.hackinn.com/ppt/2016owasp/2/2016-06-OWASP-Crypto-Attacks.pdf) #### 22、[A Blue Print for Security Culture Change](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Chris-Romeo-AppSec-Awareness.pdf) #### 23、[Game of Hacks](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Amit-Ashbel-Game-of-Hacks.pdf) #### 24、[Attracting & Retaining women in Cyber Security](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Jacky-Fox-Women-in-Cyber.pdf) #### 25、[SecDevOps: A View from the Trenches](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Abhay-Bhargav-SecDevOps__.pdf) #### 26、[Security Automation Using ZAP](https://data.hackinn.com/ppt/2016owasp/2/OWASP_AppSec_EU2016-Security_Automation_Using_ZAP_v1.3.pdf) #### 27、[A chain of Trust:How to implement a secure supply chain approach](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Ikka-Turunen-Chain-of-Trust.pdf) #### 28、[Analyzing and Detecting Flash-based Malware](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Christian-Wressengger-Flash-based-Malware.pdf) #### 29、[2016 State of Vulnerability Exploits](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Amol-Sarwate-2016-State-of-Vulnerability-Exploits.pdf) #### 30、[The Ultimate Reason Why Hackers Are Winning The Mobile Malware Battle](https://data.hackinn.com/ppt/2016owasp/2/OWASP-AppsecEu_2016-Skycure.pdf) #### 31、[The Cool Factor: Security's Secret Weapon](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Marisa-Fagan-The-Cool-Factor.pdf) #### 32、[Practical Threat Modeling with Microsofts Threat Modeling Tool 2016](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Matthias-Rohr-Practical-Threat-Modelling.pdf) #### 33、[Internet banking safeguards vulnerabilities](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Wojtek-Dworakowski-Internet-Banking-Safeguards-Vulnerabilities.pdf) #### 34、[Idiot proof is not enough, make it villain proof!](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Liesbeth-Kimpen-Think-Villain-Proof.pdf) #### 35、[Everything You Need to Know About Certificate Pinning](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-John-Kozyrakis-Certificate-Pinning.pdf) #### 36、[Running a Bug Bounty](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Grant-McCracken-Running-a-Bug-Bounty.pdf) #### 37、[Attack Tree Vignettes for CaaS](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-TonyUV-Attack-Tree-Vignette-for-CaaS.pdf) #### 38、[From Facepalm to Brain Bender–Exploring Client-Side Cross-Site Scripting](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Ben-Stock-From-Facepalm-To-Brain-Bender.pdf) #### 39、[From DTD to XXE An Evaluation of XML-Parsers](https://data.hackinn.com/ppt/2016owasp/2/AppSecEU2016-Christopher-Spaeth-From-DTD-to-XXE.pdf) >以上信息获取均来自于互联网,如涉及到版权问题请联系管理员删除,谢谢! 管理员邮箱: ``·- -·· -- ·· -· --·-· ···· ·- -·-· -·- ·· -· -· ·-·-·- -·-· --- -- `` 标签: none