Home | Site Map
 
 
[.:Partners:.]

[.:Contenuti:.]
WEB APPLICATION

Web Application Security Professionals Survey Nov
If you perform web application vulnerability assessments, Should be filled out by those who perform web application vulnerability assessments 2) What is your most common web application vulnerability assessment methodology?
New Version of Java Source Code Analysis Tool Improves Web
SPI Dynamics, Inc has announced full support for Java developers and J2EE Web applications in DevInspect 3.0, the new version of its unique developer application security solution. DevInspect is the first and only developer security
Ajax for Web Application Developers
No, this isn’ta post about how to use it, but it is a post about Kris Hadlock’s new book, Ajax for Web Application Developers. Kris is an excellent developer and is, well, more than a little obsessed with Ajax.
Online keyboard, web application - Help needed
I see a need for some sort of web application that i can have on my website which would show a keyboard and would allow key presses to correspond with specified unicode. I've been searching for hours on google to try and discover a
Deploying ASP.NET 2.0 Applications
NET applications and I encountered a couple of Visual Studio 2005 add-ons - Visual Studio 2005 Web Deployment Projects and Visual Studio 2005 Web Application Projects. I could go into some detail about each of these post-Visual Studio
Interview: Jeff Veen
It doesn't matter if you're a designer, a developer or what, the risk in building web application or frankly in visualising your ideas is so much lower now. Ten years ago it cost millions of dollars to try to visualise something.
Ajax-Enable Your Web Application
Ajax-Enable Your Web Application. This two-part demo shows you how to include Ajax in your web apps built with Java Studio Creator
Top 10 examples of web application vulnerabilities
[link][more
[Privacy] Re: Tor, IP privacy?
there's also the filter-input / filter-output debate - i'm in the input camp but i'll defend it some other time ^^ -maluc
[Privacy] Re: Tor, IP privacy?
now you may only be talking about for people banning - and for public websites their really is no way to 100% ban a person whitelist nor blacklist. But blacklisting atleast helps somewhat, and whitelisting is often unfeasible. banning

Web Applications 1.0
In particular, Web applications may wish to store megabytes of user data, It is expected that Web applications will use the global storage areas for
adaptive path » ajax: a new approach to web applications
A User Experience design and consulting firm that unites theory and practice to advance the art of user experience design while helping clients make better
LukeW: Web Application Form Design
LukeW Interface Designs provides expert interface design services for Web applications, Web sites, and Web-based multimedia.
Welcome
An open source framework for building Servlet/JSP based web applications based on the Model-View-Controller (MVC) design paradigm [Open Source, BSD-like]
The W3C Workshop on Web Applications and Compound Documents
This workshop addresses client-side Web applications only. Papers may address one or both of the Workshop topics: Web applications and compound

LukeW: Web Application Form Design
LukeW Interface Designs provides expert interface design services for Web applications, Web sites, and Web-based multimedia.
Welcome
An open source framework for building Servlet/JSP based web applications based on the Model-View-Controller (MVC) design paradigm [Open Source, BSD-like]
The W3C Workshop on Web Applications and Compound Doen
This workshop addresses client-side Web applications only. Papers may address one or both of the Workshop topics: Web applications and compound
W3C Web Application Forma Working Group
The W3C Web Application Forma Working Group is chartered to develop languages for client-side Web Application development.
Category:OWASP Project OWASP
OWASP Top Ten Project an awareness doent that describes the top ten web application security vulnerabilities; OWASP WebGoat Project an online
Home Web Application Security Consortium
Web application firewalls critical piece of the app security puzzle The Web Application Security Consortium (WASC) is an international group of exper,
Web Hypertext Application Technology Working Group
An unofficial collaboration of Web browser manufacturers and interested parties who wish to develop new technologies designed to allow authors to write and
Designing Enterprise Applications with the J2EE Platform, Second
This section describes how to use MVC to organize a J2EE Web application design using If you choose to use a Web application framework, the following
Cerca con Google


 
 
All rights reserved. info sol sito email Tutti i diritti sono riservati.