Link Details

Link 1056331 thumbnail
User 419398 avatar

By moolsan
via blog.codecentric.de
Submitted: Oct 28 2013 / 03:58

The article shows the usage of the OWASP Zed Attack Proxy, a tool for easy penetration testing of web applications to find the most common vulneranilities. Furthermore it is shown how the proxy can be combined with automated acceptance testing and integrated into your continuous delivery pipeline.
  • 3
  • 0
  • 277
  • 65

Add your comment


Html tags not supported. Reply is editable for 5 minutes. Use [code lang="java|ruby|sql|css|xml"][/code] to post code snippets.

Voters For This Link (3)



Voters Against This Link (0)



    Java Performance Optimization
    Written by: Pierre-Hugues Charbonneau
    Featured Refcardz: Top Refcardz:
    1. Design Patterns
    2. OO JS
    3. Cont. Delivery
    4. Java EE7
    5. HTML5 Mobile
    1. Node.js
    2. Debugging JavaScript
    3. OO JS
    4. JSON
    5. Ajax