SlideShare a Scribd company logo
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails
Securing Rails

More Related Content

PDF
Silent web app testing by example - BerlinSides 2011
PDF
Owasp top 10 web application security hazards - Part 1
PDF
Make CSRF Again
PDF
REST API Pentester's perspective
PDF
Js deobfuscation with JStillery - bsides-roma 2018
PPT
Data Driven Security, from Gartner Security Summit 2012
PPT
Web Application Hacking
PDF
Hacking Vulnerable Websites to Bypass Firewalls
Silent web app testing by example - BerlinSides 2011
Owasp top 10 web application security hazards - Part 1
Make CSRF Again
REST API Pentester's perspective
Js deobfuscation with JStillery - bsides-roma 2018
Data Driven Security, from Gartner Security Summit 2012
Web Application Hacking
Hacking Vulnerable Websites to Bypass Firewalls

What's hot (13)

PDF
Bypassing Web Application Firewalls and other security filters
PPTX
Anatomy of Java Vulnerabilities - NLJug 2018
PDF
Fix me if you can - DrupalCon prague
PDF
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
PPTX
Malware Analysis For The Enterprise
PDF
The Real World - Plugging the Enterprise Into It (nodejs)
PPTX
The Anatomy of Java Vulnerabilities
PDF
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
PPTX
Presentation on Top 10 Vulnerabilities in Web Application
PDF
What can you do about ransomware
PDF
FITC - Here Be Dragons: Advanced JavaScript Debugging
PDF
9 anti-patterns for node.js teams
PDF
Faraday Blackhat 2011 Arsenal
Bypassing Web Application Firewalls and other security filters
Anatomy of Java Vulnerabilities - NLJug 2018
Fix me if you can - DrupalCon prague
Обход проверки безопасности в магазинах мобильных приложений при помощи платф...
Malware Analysis For The Enterprise
The Real World - Plugging the Enterprise Into It (nodejs)
The Anatomy of Java Vulnerabilities
The Dirty Little Secrets They Didn’t Teach You In Pentesting Class
Presentation on Top 10 Vulnerabilities in Web Application
What can you do about ransomware
FITC - Here Be Dragons: Advanced JavaScript Debugging
9 anti-patterns for node.js teams
Faraday Blackhat 2011 Arsenal
Ad

Viewers also liked (6)

PDF
Work Experience E 2.0
PDF
International SEO Strategies
PPTX
SESLon 2013 - International SEO tips
DOC
Search engine optimization proposal
PPTX
Le banche sono conversazioni - slide ISBF 2014
PDF
International SEO & The Future of your ROI at #MozCon by @aleyda
Work Experience E 2.0
International SEO Strategies
SESLon 2013 - International SEO tips
Search engine optimization proposal
Le banche sono conversazioni - slide ISBF 2014
International SEO & The Future of your ROI at #MozCon by @aleyda
Ad

Similar to Securing Rails (20)

PDF
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
PDF
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
PDF
Abusing bleeding edge web standards for appsec glory
PPTX
Test & Tea : ITSEC testing, manual vs automated
PDF
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
PDF
Secure Programming With Static Analysis
PDF
2 Roads to Redemption - Thoughts on XSS and SQLIA
PDF
Smart Client Development
PDF
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
PDF
Rails Conf Europe 2007 Notes
PDF
Scaling a Rails Application from the Bottom Up
PDF
stackconf 2021 | Why you should take care of infrastructure drift
PPTX
Bug Bounty for - Beginners
PDF
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
PDF
Putting Rugged Into your DevOps Toolchain
PDF
Os Nightingale
PPTX
Search for Vulnerabilities Using Static Code Analysis
PDF
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
PDF
Puppet for Sys Admins
PPTX
Adventures in Asymmetric Warfare
Static Analysis Techniques For Testing Application Security - Houston Tech Fest
Єгор Попович, CTO @Tesseract, (Lviv, Ukraine) "Blockchain user: myth or reali...
Abusing bleeding edge web standards for appsec glory
Test & Tea : ITSEC testing, manual vs automated
Moved to https://slidr.io/azzazzel/web-application-performance-tuning-beyond-xmx
Secure Programming With Static Analysis
2 Roads to Redemption - Thoughts on XSS and SQLIA
Smart Client Development
[RHFSeoul2017]6 Steps to Transform Enterprise Applications
Rails Conf Europe 2007 Notes
Scaling a Rails Application from the Bottom Up
stackconf 2021 | Why you should take care of infrastructure drift
Bug Bounty for - Beginners
[CB20] Vulnerabilities of Machine Learning Infrastructure by Sergey Gordeychik
Putting Rugged Into your DevOps Toolchain
Os Nightingale
Search for Vulnerabilities Using Static Code Analysis
Cloud adoption fails - 5 ways deployments go wrong and 5 solutions
Puppet for Sys Admins
Adventures in Asymmetric Warfare

More from Alex Payne (18)

PDF
Splitting up your web app
PDF
The perils and rewards of working on stuff that matters
PDF
Emerging Languages: A Tour of the Horizon
KEY
The Why and How of Scala at Twitter
KEY
Building Distributed Systems in Scala
KEY
Speedy, Stable, and Secure: Better Web Apps Through Functional Languages
PDF
Mind The Tools
ZIP
Strange Loop 2009 Keynote: Minimalism in Computing
ZIP
The Business Value of Twitter
KEY
Twitter API 2.0
ZIP
The Interaction Design Of APIs
ZIP
Why Scala for Web 2.0?
ZIP
The Twitter API: A Presentation to Adobe
ZIP
Protecting Public Hotspots
ZIP
Twitter at BarCamp 2008
PDF
Why Scala?
PDF
Designing Your API
PDF
Scaling Twitter - Railsconf 2007
Splitting up your web app
The perils and rewards of working on stuff that matters
Emerging Languages: A Tour of the Horizon
The Why and How of Scala at Twitter
Building Distributed Systems in Scala
Speedy, Stable, and Secure: Better Web Apps Through Functional Languages
Mind The Tools
Strange Loop 2009 Keynote: Minimalism in Computing
The Business Value of Twitter
Twitter API 2.0
The Interaction Design Of APIs
Why Scala for Web 2.0?
The Twitter API: A Presentation to Adobe
Protecting Public Hotspots
Twitter at BarCamp 2008
Why Scala?
Designing Your API
Scaling Twitter - Railsconf 2007

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Network Security Unit 5.pdf for BCA BBA.
PPTX
Digital-Transformation-Roadmap-for-Companies.pptx
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Electronic commerce courselecture one. Pdf
PPTX
MYSQL Presentation for SQL database connectivity
DOCX
The AUB Centre for AI in Media Proposal.docx
PPTX
A Presentation on Artificial Intelligence
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
cuic standard and advanced reporting.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Encapsulation theory and applications.pdf
PDF
Machine learning based COVID-19 study performance prediction
Chapter 3 Spatial Domain Image Processing.pdf
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Network Security Unit 5.pdf for BCA BBA.
Digital-Transformation-Roadmap-for-Companies.pptx
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
“AI and Expert System Decision Support & Business Intelligence Systems”
Dropbox Q2 2025 Financial Results & Investor Presentation
Diabetes mellitus diagnosis method based random forest with bat algorithm
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Electronic commerce courselecture one. Pdf
MYSQL Presentation for SQL database connectivity
The AUB Centre for AI in Media Proposal.docx
A Presentation on Artificial Intelligence
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
cuic standard and advanced reporting.pdf
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Encapsulation theory and applications.pdf
Machine learning based COVID-19 study performance prediction