Monday — November 14th, 2005 16:20
A discussion on identifying, evaluating, and selecting tools used to identify security weaknesses in Web based Applications.Chad Hughes, Eric Veum, Mark Fallon
Chad Hughes (Oracle, US) 
Eric Veum (Oracle, US) 
Mark Fallon (Oracle, US) 