ºÝºÝߣshows by User: ZakiehAlizadeh / http://www.slideshare.net/images/logo.gif ºÝºÝߣshows by User: ZakiehAlizadeh / Wed, 25 Apr 2018 09:45:43 GMT ºÝºÝߣShare feed for ºÝºÝߣshows by User: ZakiehAlizadeh Session11-NoSQL InjectionPHP Injection /slideshow/session11nosql-injectionphp-injection/94972194 nosql-classnew-180425094544
NoSQL Injection Injection]]>

NoSQL Injection Injection]]>
Wed, 25 Apr 2018 09:45:43 GMT /slideshow/session11nosql-injectionphp-injection/94972194 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session11-NoSQL InjectionPHP Injection ZakiehAlizadeh NoSQL Injection Injection <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/nosql-classnew-180425094544-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> NoSQL Injection Injection
Session11-NoSQL InjectionPHP Injection from zakieh alizadeh
]]>
449 1 https://cdn.slidesharecdn.com/ss_thumbnails/nosql-classnew-180425094544-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session10-PHP Misconfiguration /slideshow/session10php-misconfiguration/94971987 s10-misconfiguration-180425094300
Table Of Content The OWASP Top Ten Invalidated Redirect and Forwards Security Misconfiguration Application Fingerprint Error handling And Logging Noise PHP Guidelines ]]>

Table Of Content The OWASP Top Ten Invalidated Redirect and Forwards Security Misconfiguration Application Fingerprint Error handling And Logging Noise PHP Guidelines ]]>
Wed, 25 Apr 2018 09:43:00 GMT /slideshow/session10php-misconfiguration/94971987 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session10-PHP Misconfiguration ZakiehAlizadeh Table Of Content The OWASP Top Ten Invalidated Redirect and Forwards Security Misconfiguration Application Fingerprint Error handling And Logging Noise PHP Guidelines <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/s10-misconfiguration-180425094300-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Table Of Content The OWASP Top Ten Invalidated Redirect and Forwards Security Misconfiguration Application Fingerprint Error handling And Logging Noise PHP Guidelines
Session10-PHP Misconfiguration from zakieh alizadeh
]]>
739 3 https://cdn.slidesharecdn.com/ss_thumbnails/s10-misconfiguration-180425094300-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session9-File Upload Security /slideshow/session9file-upload-security/94971781 s9-file-upload-security-180425094019
Table Of Content File System Concept Permissions Path traversal & File Inclusion Introducing Risk Factors of File Uploads Weak Protection Methods Countermeasure ]]>

Table Of Content File System Concept Permissions Path traversal & File Inclusion Introducing Risk Factors of File Uploads Weak Protection Methods Countermeasure ]]>
Wed, 25 Apr 2018 09:40:19 GMT /slideshow/session9file-upload-security/94971781 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session9-File Upload Security ZakiehAlizadeh Table Of Content File System Concept Permissions Path traversal & File Inclusion Introducing Risk Factors of File Uploads Weak Protection Methods Countermeasure <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/s9-file-upload-security-180425094019-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Table Of Content File System Concept Permissions Path traversal &amp; File Inclusion Introducing Risk Factors of File Uploads Weak Protection Methods Countermeasure
Session9-File Upload Security from zakieh alizadeh
]]>
167 3 https://cdn.slidesharecdn.com/ss_thumbnails/s9-file-upload-security-180425094019-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
S8-Session Managment /ZakiehAlizadeh/s8session-managment s8-sessionmanagment-180425093546
Table Of Content Description Mechanism of Cookies Introducing Session Management Attacks Session Fixation Session Brute-Forcing Session Hijacking Session Poisoning Strategies Of Session Storage Strategies For Providing Secure Session Management ]]>

Table Of Content Description Mechanism of Cookies Introducing Session Management Attacks Session Fixation Session Brute-Forcing Session Hijacking Session Poisoning Strategies Of Session Storage Strategies For Providing Secure Session Management ]]>
Wed, 25 Apr 2018 09:35:46 GMT /ZakiehAlizadeh/s8session-managment ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) S8-Session Managment ZakiehAlizadeh Table Of Content Description Mechanism of Cookies Introducing Session Management Attacks Session Fixation Session Brute-Forcing Session Hijacking Session Poisoning Strategies Of Session Storage Strategies For Providing Secure Session Management <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/s8-sessionmanagment-180425093546-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Table Of Content Description Mechanism of Cookies Introducing Session Management Attacks Session Fixation Session Brute-Forcing Session Hijacking Session Poisoning Strategies Of Session Storage Strategies For Providing Secure Session Management
S8-Session Managment from zakieh alizadeh
]]>
156 1 https://cdn.slidesharecdn.com/ss_thumbnails/s8-sessionmanagment-180425093546-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session7-XSS & CSRF /slideshow/session7xss-csrf/94971125 s7-xss-csrf-180425093237
Table Of Content Introduce XSS attacks Strategies for Preventing of XSS Introduce CSRF Attacks Strategies For Preventing Of CSRF ]]>

Table Of Content Introduce XSS attacks Strategies for Preventing of XSS Introduce CSRF Attacks Strategies For Preventing Of CSRF ]]>
Wed, 25 Apr 2018 09:32:37 GMT /slideshow/session7xss-csrf/94971125 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session7-XSS & CSRF ZakiehAlizadeh Table Of Content Introduce XSS attacks Strategies for Preventing of XSS Introduce CSRF Attacks Strategies For Preventing Of CSRF <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/s7-xss-csrf-180425093237-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Table Of Content Introduce XSS attacks Strategies for Preventing of XSS Introduce CSRF Attacks Strategies For Preventing Of CSRF
Session7-XSS & CSRF from zakieh alizadeh
]]>
352 2 https://cdn.slidesharecdn.com/ss_thumbnails/s7-xss-csrf-180425093237-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session6-Protecct Sensetive Data /slideshow/session6protecct-sensetive-data/94970686 session6-protecctsensetivedata-180425092716
Data Protection in Storage Encryption Encoding Hashing Encoding .Vs. Encryption .Vs. Hashing ]]>

Data Protection in Storage Encryption Encoding Hashing Encoding .Vs. Encryption .Vs. Hashing ]]>
Wed, 25 Apr 2018 09:27:16 GMT /slideshow/session6protecct-sensetive-data/94970686 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session6-Protecct Sensetive Data ZakiehAlizadeh Data Protection in Storage Encryption Encoding Hashing Encoding .Vs. Encryption .Vs. Hashing <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session6-protecctsensetivedata-180425092716-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Data Protection in Storage Encryption Encoding Hashing Encoding .Vs. Encryption .Vs. Hashing
Session6-Protecct Sensetive Data from zakieh alizadeh
]]>
93 2 https://cdn.slidesharecdn.com/ss_thumbnails/session6-protecctsensetivedata-180425092716-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
S5-Authorization /slideshow/s5authorization/94969707 s5-authorization-180425091656
Authorization is the process of giving someone permission to do or have something. Table of Content Introduction Authorization Common Attacker Testing Authentication Strategies For Strong Authentication Access Control]]>

Authorization is the process of giving someone permission to do or have something. Table of Content Introduction Authorization Common Attacker Testing Authentication Strategies For Strong Authentication Access Control]]>
Wed, 25 Apr 2018 09:16:56 GMT /slideshow/s5authorization/94969707 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) S5-Authorization ZakiehAlizadeh Authorization is the process of giving someone permission to do or have something. Table of Content Introduction Authorization Common Attacker Testing Authentication Strategies For Strong Authentication Access Control <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/s5-authorization-180425091656-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Authorization is the process of giving someone permission to do or have something. Table of Content Introduction Authorization Common Attacker Testing Authentication Strategies For Strong Authentication Access Control
S5-Authorization from zakieh alizadeh
]]>
165 4 https://cdn.slidesharecdn.com/ss_thumbnails/s5-authorization-180425091656-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session4-Authentication /slideshow/session4authentication/94942993 session4-authentication-180425045731
Table of Content Common Web Authentication Threats Common Weak Web Authentication Strategies Strategies For Strong Authentication ]]>

Table of Content Common Web Authentication Threats Common Weak Web Authentication Strategies Strategies For Strong Authentication ]]>
Wed, 25 Apr 2018 04:57:31 GMT /slideshow/session4authentication/94942993 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session4-Authentication ZakiehAlizadeh Table of Content Common Web Authentication Threats Common Weak Web Authentication Strategies Strategies For Strong Authentication <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session4-authentication-180425045731-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Table of Content Common Web Authentication Threats Common Weak Web Authentication Strategies Strategies For Strong Authentication
Session4-Authentication from zakieh alizadeh
]]>
102 2 https://cdn.slidesharecdn.com/ss_thumbnails/session4-authentication-180425045731-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session3 data-validation-sql injection /slideshow/session3-datavalidationsql-injection/94942817 session3-data-validation-sqlinjection-180425045549
Table of Content Web Application Firewall possible security measures of WAF Data Validation Strategies Varieties Of Input Reject Known Bad Accept Known Good Sanitization Safe Data Handling Semantic Checks Introduction SQL Injection A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application SQL Injection Blind SQL Injection ]]>

Table of Content Web Application Firewall possible security measures of WAF Data Validation Strategies Varieties Of Input Reject Known Bad Accept Known Good Sanitization Safe Data Handling Semantic Checks Introduction SQL Injection A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application SQL Injection Blind SQL Injection ]]>
Wed, 25 Apr 2018 04:55:49 GMT /slideshow/session3-datavalidationsql-injection/94942817 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session3 data-validation-sql injection ZakiehAlizadeh Table of Content Web Application Firewall possible security measures of WAF Data Validation Strategies Varieties Of Input Reject Known Bad Accept Known Good Sanitization Safe Data Handling Semantic Checks Introduction SQL Injection A SQL injection attack consists of insertion or "injection" of a SQL query via the input data from the client to the application SQL Injection Blind SQL Injection <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session3-data-validation-sqlinjection-180425045549-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Table of Content Web Application Firewall possible security measures of WAF Data Validation Strategies Varieties Of Input Reject Known Bad Accept Known Good Sanitization Safe Data Handling Semantic Checks Introduction SQL Injection A SQL injection attack consists of insertion or &quot;injection&quot; of a SQL query via the input data from the client to the application SQL Injection Blind SQL Injection
Session3 data-validation-sql injection from zakieh alizadeh
]]>
231 2 https://cdn.slidesharecdn.com/ss_thumbnails/session3-data-validation-sqlinjection-180425045549-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session2-Application Threat Modeling /slideshow/session2application-threat-modeling/94942520 session2-theredmodeling-180425045253
Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning. ]]>

Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning. ]]>
Wed, 25 Apr 2018 04:52:53 GMT /slideshow/session2application-threat-modeling/94942520 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session2-Application Threat Modeling ZakiehAlizadeh Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning. <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session2-theredmodeling-180425045253-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Threat modeling is an approach for analyzing the security of an application. It is a structured approach that enables you to identify, quantify, and address the security risks associated with an application Threat modeling is not an approach to reviewing code, but it does complement the security code review process. The inclusion of threat modeling in the SDLC can help to ensure that applications are being developed with security built-in from the very beginning.
Session2-Application Threat Modeling from zakieh alizadeh
]]>
164 2 https://cdn.slidesharecdn.com/ss_thumbnails/session2-theredmodeling-180425045253-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session1-Introduce Http-HTTP Security headers /slideshow/session1introduce-httphttp-security-headers/94942127 session1-webapp-http-180425044859
Description of "Web Application Architecture" Web Application Technologies Scenario : " Tampering HTTP Requests " Introducing HTTP Protocol HTTP Requests and Responses HTTP Methods URLs HTTP Headers Cookies HTTP Proxies Web Functionality Server-Side Functionality Client-Side Functionality 4 HTTP Security headers Content-Security-Policy X-Frame-Options X-Content-Type-Options Strict-Transport-Security ]]>

Description of "Web Application Architecture" Web Application Technologies Scenario : " Tampering HTTP Requests " Introducing HTTP Protocol HTTP Requests and Responses HTTP Methods URLs HTTP Headers Cookies HTTP Proxies Web Functionality Server-Side Functionality Client-Side Functionality 4 HTTP Security headers Content-Security-Policy X-Frame-Options X-Content-Type-Options Strict-Transport-Security ]]>
Wed, 25 Apr 2018 04:48:59 GMT /slideshow/session1introduce-httphttp-security-headers/94942127 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session1-Introduce Http-HTTP Security headers ZakiehAlizadeh Description of "Web Application Architecture" Web Application Technologies Scenario : " Tampering HTTP Requests " Introducing HTTP Protocol HTTP Requests and Responses HTTP Methods URLs HTTP Headers Cookies HTTP Proxies Web Functionality Server-Side Functionality Client-Side Functionality 4 HTTP Security headers Content-Security-Policy X-Frame-Options X-Content-Type-Options Strict-Transport-Security <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session1-webapp-http-180425044859-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Description of &quot;Web Application Architecture&quot; Web Application Technologies Scenario : &quot; Tampering HTTP Requests &quot; Introducing HTTP Protocol HTTP Requests and Responses HTTP Methods URLs HTTP Headers Cookies HTTP Proxies Web Functionality Server-Side Functionality Client-Side Functionality 4 HTTP Security headers Content-Security-Policy X-Frame-Options X-Content-Type-Options Strict-Transport-Security
Session1-Introduce Http-HTTP Security headers from zakieh alizadeh
]]>
498 2 https://cdn.slidesharecdn.com/ss_thumbnails/session1-webapp-http-180425044859-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
yii framework /slideshow/document1-66991464/66991464 f2336e3c-61e8-4b33-8990-90386df4cdfb-161011054246
]]>

]]>
Tue, 11 Oct 2016 05:42:46 GMT /slideshow/document1-66991464/66991464 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) yii framework ZakiehAlizadeh <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/f2336e3c-61e8-4b33-8990-90386df4cdfb-161011054246-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
yii framework from zakieh alizadeh
]]>
90 1 https://cdn.slidesharecdn.com/ss_thumbnails/f2336e3c-61e8-4b33-8990-90386df4cdfb-161011054246-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Web security Contents /slideshow/document-66991431/66991431 dd4fe571-03f2-42c7-b4ef-3d9a772ac4a5-161011054054
]]>

]]>
Tue, 11 Oct 2016 05:40:54 GMT /slideshow/document-66991431/66991431 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Web security Contents ZakiehAlizadeh <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/dd4fe571-03f2-42c7-b4ef-3d9a772ac4a5-161011054054-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Web security Contents from zakieh alizadeh
]]>
311 2 https://cdn.slidesharecdn.com/ss_thumbnails/dd4fe571-03f2-42c7-b4ef-3d9a772ac4a5-161011054054-thumbnail.jpg?width=120&height=120&fit=bounds document Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Validating and Sanitizing User Data /slideshow/validating-vs-sanitizing-and-escaping-user-data/47104126 terminology-150417032646-conversion-gate01
Validating Sanitizing and Escaping User Data]]>

Validating Sanitizing and Escaping User Data]]>
Fri, 17 Apr 2015 03:26:46 GMT /slideshow/validating-vs-sanitizing-and-escaping-user-data/47104126 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Validating and Sanitizing User Data ZakiehAlizadeh Validating Sanitizing and Escaping User Data <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/terminology-150417032646-conversion-gate01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> Validating Sanitizing and Escaping User Data
Validating and Sanitizing User Data from zakieh alizadeh
]]>
912 3 https://cdn.slidesharecdn.com/ss_thumbnails/terminology-150417032646-conversion-gate01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Session3 data-validation /slideshow/session3-datavalidation/26424443 session3-data-validation-130922014130-phpapp01
]]>

]]>
Sun, 22 Sep 2013 01:41:30 GMT /slideshow/session3-datavalidation/26424443 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Session3 data-validation ZakiehAlizadeh <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/session3-data-validation-130922014130-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br>
Session3 data-validation from zakieh alizadeh
]]>
1332 2 https://cdn.slidesharecdn.com/ss_thumbnails/session3-data-validation-130922014130-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation Black http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
Introduce Yii /slideshow/presentation1-23704273/23704273 presentation1-130630065323-phpapp01
this slide introducing Yii and description installing Yii]]>

this slide introducing Yii and description installing Yii]]>
Sun, 30 Jun 2013 06:53:23 GMT /slideshow/presentation1-23704273/23704273 ZakiehAlizadeh@slideshare.net(ZakiehAlizadeh) Introduce Yii ZakiehAlizadeh this slide introducing Yii and description installing Yii <img style="border:1px solid #C3E6D8;float:right;" alt="" src="https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-130630065323-phpapp01-thumbnail.jpg?width=120&amp;height=120&amp;fit=bounds" /><br> this slide introducing Yii and description installing Yii
Introduce Yii from zakieh alizadeh
]]>
2806 5 https://cdn.slidesharecdn.com/ss_thumbnails/presentation1-130630065323-phpapp01-thumbnail.jpg?width=120&height=120&fit=bounds presentation White http://activitystrea.ms/schema/1.0/post http://activitystrea.ms/schema/1.0/posted 0
https://public.slidesharecdn.com/v2/images/profile-picture.png • Experienced and Instructor in web security (Secure programming, penetration testing) • Developer and Instructor Yii.1 & Yii.2 https://cdn.slidesharecdn.com/ss_thumbnails/nosql-classnew-180425094544-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/session11nosql-injectionphp-injection/94972194 Session11-NoSQL Inject... https://cdn.slidesharecdn.com/ss_thumbnails/s10-misconfiguration-180425094300-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/session10php-misconfiguration/94971987 Session10-PHP Misconfi... https://cdn.slidesharecdn.com/ss_thumbnails/s9-file-upload-security-180425094019-thumbnail.jpg?width=320&height=320&fit=bounds slideshow/session9file-upload-security/94971781 Session9-File Upload S...