ÀÚ·á°Ë»ö-Ç¥ÁØ

Ȩ > ÀڷḶ´ç > ÀÚ·á°Ë»ö > Ç¥ÁØ

ÀÚ·á °Ë»ö°á°ú

°Ë»öÆäÀÌÁö·Î
Ç¥ÁØÁ¾·ù Á¤º¸Åë½Å´ÜüǥÁØ(TTAS)
Ç¥ÁعøÈ£ TTAR-12.0010 ±¸ Ç¥ÁعøÈ£
Á¦°³Á¤ÀÏ 2012-12-13 ÃÑ ÆäÀÌÁö 36
ÇÑ±Û Ç¥Áظí À¥ ÀÀ¿ë Ãë¾àÁ¡(±â¼úº¸°í¼­)
¿µ¹® Ç¥Áظí Web Application Vulnerabilities (Technical Report)
ÇÑ±Û ³»¿ë¿ä¾à º» ±â¼úº¸°í¼­´Â 2012³âµµ ±âÁØÀ¸·Î °¡Àå À§Çèµµ°¡ ³ôÀº À¥ Ãë¾àÁ¡¿¡ ´ëÇؼ­ »óÈ£ µ¶¸³ÀûÀÎ 28 °³ÀÇ Ãë¾àÁ¡ ¸ñ·ÏÀ» Á¤ÀÇÇÏ¿´´Ù.
¿µ¹® ³»¿ë¿ä¾à This technical report contains the independent 28 lists and its definition about web vulnerabilities which are critical and risky on 2012.
°ü·Ã IPR È®¾à¼­ Á¢¼öµÈ IPR È®¾à¼­ ¾øÀ½
°ü·ÃÆÄÀÏ    TTAR-12.0010.pdf TTAR-12.0010.pdf
Ç¥ÁØÀÌ·Â
Ç¥Áظí Ç¥ÁعøÈ£ Á¦°³Á¤ÀÏ ±¸ºÐ À¯È¿
¿©ºÎ
IPR
È®¾à¼­
ÆÄÀÏ
À¥ ÀÀ¿ë Ãë¾àÁ¡(±â¼úº¸°í¼­) TTAR-12.0010 2012-12-13 Á¦Á¤ À¯È¿ ¾øÀ½ TTAR-12.0010.pdf
Ç¥ÁØÀ¯Áöº¸¼öÀÌ·Â
°ËÅäÀÏÀÚ °ËÅä°á°ú °ËÅä³»¿ë
2016-06-08 °³Á¤ -