Create Account | Sign In Browse All Bookmarks

Browse Bookmarks

0(*_*)0
1 to 10 of 27 results Order by recency | popularity
0 ✔ | 1 ♥ Risk Matrix Calculations – Severity, Probab...
security, risk, risk assessment, priority, pr...
0 ✔ | 1 ♥ draft-ietf-opsawg-tacacs-07 - The TACACS+ Pro...
TACACS+ provides Device Administration for routers, network access servers and other networked computing devices via one or more centralized servers. This document describes the protocol that is used by TACACS+.
networking, security, tacacs, tacacs plus
0 ✔ | 1 ♥ OWASP - Security Principles
owasp, security, principles, best practices, ...
0 ✔ | 1 ♥ Subgraph - Open Source Security
Developers of open source security software, including Vega, OWASP-ish security scanning tool.
owasp, security, open source, vega, software,...
0 ✔ | 1 ♥ Schneier on Security
blogs, bruce schneier, schneier, security, in...
0 ✔ | 1 ♥ XML Denial of Service Attacks and Defenses
the billion laughs attack ... neat.
xml, security, exploits, billion laughs attac...
0 ✔ | 1 ♥ Security Study of Commercially Deployed Singl...
outlines security flaws (many fixed as a result of this study) that call for some diligence on both the part of identity providers and consumers
pdfs, security, single sign on, facebook, ope...
0 ✔ | 1 ♥ StartSSL™ Certificates & Public Key Inf...
free SSL certs?
ssl, web development, security, free, ssl certs
<~~  <~  1 2 3  ~>  ~~>