HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Robust defenses for cross-site request forgery
Proceedings of the 15th ACM conference on Computer and communications security
Insecure context switching: inoculating regular expressions for survivability
WOOT'08 Proceedings of the 2nd conference on USENIX Workshop on offensive technologies
ETFA'09 Proceedings of the 14th IEEE international conference on Emerging technologies & factory automation
CardSpace-liberty integration for CardSpace users
Proceedings of the 9th Symposium on Identity and Trust on the Internet
An effective method for combating malicious scripts clickbots
ESORICS'09 Proceedings of the 14th European conference on Research in computer security
Shibboleth and community authorization services: enabling role-based grid access
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part II
Hi-index | 0.00 |
Using web servers and web applications as running examples throughout, this comprehensive guide helps you manage risk due to insecure code and build trust with users by showing how to write code to prevent, detect, and contain attacks.