Web App 02/2012

This text is available for purchase but you need to login or register first.
You can buy this for 10 USD
Please register for free account or subscribe and get access to all issues on this website!

Remember Me

Important:
Active subscribers – to download this issue click on the cover of the magazine on the main website or scroll down this page and click the Download button
Single issue buyers – after paying for this issue click “Web App 02/2012″ (which will show just above that text)to download your copy of the magazine

Cloud Computing – Legal Issues
by Abhijeet Parandekar &Sagar Rahurkar

Cloud computing involves the sharing or storage by users of their
own information on remote servers owned or operated by others
and accessed through the Internet or other connections. Cloud
computing services exist in many variations, including data storage
sites, video sites, tax preparation sites, personal health record websites,
photography websites, social networking sites, and many more

Data Dilution Mechanics
by Tibor Sahinpasic

To prevent unauthorized access to sensitive data, one of the best
security practices is cryptography. Encryption theoretically ensures
that only the right people have access to the protected data, which
is why it is frequently deployed by big businesses and government
to prevent civilians and hostile (foreign) forces from obtaining
sensitive documents, or data, and intercepting communications.

Web Application Security for Newbies – Part 3
by Herman Stevens

Last month we learned how to use the Fiddler tool to investigate
the traffic between a browser and a web server and learned what
information can be gathered from the HTTP headers and how to
present this in a report.

Platform for Application Risk Intelligence
by Mat Siman

Source Code Analysis technologies have significantly evolved in
recent years – making im-provements in precision and accuracy
with the introduction of new analysis techniques like flow analysis.
This article describes this evolution and how the most advanced
capabilities available today like query-based analysis and Knowledge
Discovery can be leveraged to create a platform for Application Risk
Intelligence (ARI) to help implement a proactive secu-rity program.
Articles
by Patrick Ouellette

The trend of & demand for creating realistic yet challenging virtualized,
possibly portable, and readily manageable CyberRanges designed
to help teach WhiteHats / CyberDefense Arts through practical
PenTesting and CyberWarfare skills has grown dramatically over the
last few years. Skills competitions and challenges are now considered
to be a necessary part of keeping cyber skills sharp and up-to-date

Search Form Based DoS
by Bunyamin Demir

Almost all the applications we use include forms which we can
perform searches. In addition to some applications, which have
simple search forms, we often see more complex search forms.

Penetration Tester’s Open Source Toolkit
by Aby Rao

Cyber Styletto
by Mike Brennan and Richard Stiennon

Web App 02/2012Web App 02/2012 - PenTest Teaser
Web App 02/2012

Follow the steps below to download the magazine:
  1. Register, accept the Disclaimer and choose subscription option.
    Attention!
    By choosing the Free Account option you will only be able to download the teaser of each issue.
  2. Verify your account using the verification link sent to your email address.
  3. Check the password sent on your email address and use it to log in.
  4. Click the download button to get the issue.

IMPORTANT: the registration on the website includes subscription to our newsletter.

Comments are closed.