skip to content
OWASP : threats and session security Preview this item
ClosePreview this item
Checking...

OWASP : threats and session security

Author: Don Kiely; Integrity Training,; Stone River eLearning,
Publisher: [Place of publication not identified] : Stone River eLearning, [2019]
Edition/Format:   eVideo : Clipart/images/graphics : English
Summary:
"The OWASP: Threats Fundamentals course is part of a series of training courses on the Open Web Application Security Project (OWASP). This course covers the fundamental concepts and techniques to identify different types of threats. The course also teaches the students to improve the security by avoiding misconfigurations, data exposure and insecure cryptography. The OWASP Foundation was established with a purpose  Read more...
Rating:

(not yet rated) 0 with reviews - Be the first.

Subjects
More like this

Find a copy online

Links to this item

Find a copy in the library

&AllPage.SpinnerRetrieving; Finding libraries that hold this item...

Details

Material Type: Clipart/images/graphics, Internet resource, Videorecording
Document Type: Internet Resource, Computer File, Visual material
All Authors / Contributors: Don Kiely; Integrity Training,; Stone River eLearning,
OCLC Number: 1105058607
Notes: Title from title screen (viewed June 18, 2019).
Date of publication from resource description page.
Performer(s): Presenter, Don Kiely.
Description: 1 online resource (1 streaming video file (3 hr., 44 min., 17 sec.)) : digital, sound, color
Other Titles: Open Web Application Security Project : threats and session security
Threats fundamentals
Responsibility: Don Kiely.

Abstract:

"The OWASP: Threats Fundamentals course is part of a series of training courses on the Open Web Application Security Project (OWASP). This course covers the fundamental concepts and techniques to identify different types of threats. The course also teaches the students to improve the security by avoiding misconfigurations, data exposure and insecure cryptography. The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values."--Resource description page.

Reviews

User-contributed reviews
Retrieving GoodReads reviews...
Retrieving DOGObooks reviews...

Tags

Be the first.
Confirm this request

You may have already requested this item. Please select Ok if you would like to proceed with this request anyway.

Linked Data


Primary Entity

<http://www.worldcat.org/oclc/1105058607> # OWASP : threats and session security
    a schema:Movie, schema:VideoObject, schema:CreativeWork ;
    library:oclcnum "1105058607" ;
    rdfs:comment "Unknown 'gen' value: cig" ;
    schema:about <http://experiment.worldcat.org/entity/work/data/9342321170#Topic/hacking> ; # Hacking
    schema:about <http://experiment.worldcat.org/entity/work/data/9342321170#Topic/computer_security> ; # Computer security
    schema:about <http://experiment.worldcat.org/entity/work/data/9342321170#Topic/web_applications> ; # Web applications
    schema:about <http://experiment.worldcat.org/entity/work/data/9342321170#Topic/computer_networks_security_measures> ; # Computer networks--Security measures
    schema:alternateName "Threats fundamentals" ;
    schema:alternateName "Open Web Application Security Project : threats and session security" ;
    schema:contributor <http://experiment.worldcat.org/entity/work/data/9342321170#Organization/integrity_training> ; # Integrity Training,
    schema:creator <http://experiment.worldcat.org/entity/work/data/9342321170#Person/kiely_don> ; # Don Kiely
    schema:datePublished "2019" ;
    schema:description ""The OWASP: Threats Fundamentals course is part of a series of training courses on the Open Web Application Security Project (OWASP). This course covers the fundamental concepts and techniques to identify different types of threats. The course also teaches the students to improve the security by avoiding misconfigurations, data exposure and insecure cryptography. The OWASP Foundation was established with a purpose to secure the applications in such a way that they can be conceived, developed, acquired, operated, and maintained in a trusted way. All of the OWASP tools, documents, forums, and chapters are free and open to anyone interested in improving application security. This course along with the other courses in the series on OWASP provides a basic overview of the concepts that form an integral part of the OWASP core values."--Resource description page."@en ;
    schema:exampleOfWork <http://worldcat.org/entity/work/id/9342321170> ;
    schema:inLanguage "en" ;
    schema:name "OWASP : threats and session security"@en ;
    schema:productID "1105058607" ;
    schema:publisher <http://experiment.worldcat.org/entity/work/data/9342321170#Organization/stone_river_elearning> ; # Stone River eLearning,
    schema:url <http://proquest.safaribooksonline.com/?fpi=300000006ca302> ;
    wdrs:describedby <http://www.worldcat.org/title/-/oclc/1105058607> ;
    .


Related Entities

<http://experiment.worldcat.org/entity/work/data/9342321170#Organization/stone_river_elearning> # Stone River eLearning,
    a schema:Organization ;
    schema:name "Stone River eLearning," ;
    .

<http://experiment.worldcat.org/entity/work/data/9342321170#Person/kiely_don> # Don Kiely
    a schema:Person ;
    schema:familyName "Kiely" ;
    schema:givenName "Don" ;
    schema:name "Don Kiely" ;
    .

<http://experiment.worldcat.org/entity/work/data/9342321170#Topic/computer_networks_security_measures> # Computer networks--Security measures
    a schema:Intangible ;
    schema:name "Computer networks--Security measures"@en ;
    .

<http://experiment.worldcat.org/entity/work/data/9342321170#Topic/computer_security> # Computer security
    a schema:Intangible ;
    schema:name "Computer security"@en ;
    .


Content-negotiable representations

Close Window

Please sign in to WorldCat 

Don't have an account? You can easily create a free account.