Relative Content

Tag Archive for Execution

Source Boston 2010: Execution Flow-Based Web Application Testing 6/6

Clip 6/6 Speakers: Rafal Los & Matt Wood, HP Software Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface […]

Source Boston 2010: Execution Flow-Based Web Application Testing 3/6

Clip 3/6 Speakers: Rafal Los & Matt Wood, HP Software Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface […]

Source Boston 2010: Execution Flow-Based Web Application Testing 5/6

Clip 5/6 Speakers: Rafal Los & Matt Wood, HP Software Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface […]

Source Boston 2010: Execution Flow-Based Web Application Testing 4/6

Clip 4/6 Speakers: Rafal Los & Matt Wood, HP Software Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface […]

Source Boston 2010: Execution Flow-Based Web Application Testing 1/6

Clip 1/6 Speakers: Rafal Los & Matt Wood, HP Software Since the caveman first fashioned a spear humans have been using tools to make them more efficient and effective. Unfortunately, today’s analysts often misunderstand the role tools play in testing web applications. While tools can be quite good at mapping a web application’s attack surface […]