Create Account | Sign In Browse All Bookmarks

Browse Bookmarks

0(*_*)0
1 to 10 of 27 results Order by recency | popularity
0 ✔ | 1 ♥ Risk Matrix Calculations – Severity, Probab...
prioritization, priority, risk, risk assessme...
0 ✔ | 1 ♥ draft-ietf-opsawg-tacacs-07 - The TACACS+ Pro...
TACACS+ provides Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document describes the protocol that is used by TACACS+.
networking, security, tacacs, tacacs plus
0 ✔ | 1 ♥ OWASP - Security Principles
best practices, development, owasp, principle...
0 ✔ | 1 ♥ Subgraph - Open Source Security
Developers of open source security software, including Vega, OWASP-ish security scanning tool.
open source, owasp, owasp scanner, security, ...
0 ✔ | 1 ♥ Schneier on Security
blogs, bruce schneier, internet, internet sec...
0 ✔ | 1 ♥ XML Denial of Service Attacks and Defenses
the billion laughs attack ... neat.
billion laughs attack, dot net, exploits, lol...
0 ✔ | 1 ♥ Security Study of Commercially Deployed Singl...
outlines security flaws (many fixed as a result of this study) that call for some diligence on both the part of identity providers and consumers
development, facebook, facebook connect, fede...
0 ✔ | 1 ♥ StartSSL™ Certificates & Public Key Inf...
free SSL certs?
free, security, ssl, ssl certs, web development
<~~  <~  1 2 3  ~>  ~~>