Application security

Results: 14395



#Item
761

gFuzz: An instrumented Web application fuzzing environment Ezequiel D. Gutesman Corelabs Core Security Technologies

Add to Reading List

Source URL: archive.hack.lu

Language: English - Date: 2008-12-03 13:56:20
    762

    600 series Marvell ARMADA 610 Application Processor 1Ghz, 1080p Encode/Decode, 16MP ISP, 45 MTPS 3D, Integrated EPD Controller, 4x Displays, Security Enabled, POP/Discrete and Consumer Package

    Add to Reading List

    Source URL: www.marvell.com

    Language: English - Date: 2011-08-30 18:16:37
      763

      THE BLIND SPOT IN THREAT INTELLIGENCE THE BLIND SPOT IN THREAT INTELLIGENCE How application threat intelligence can make existing enterprise security infrastructures smarter

      Add to Reading List

      Source URL: www.prevoty.com

      Language: English - Date: 2015-06-14 17:21:14
        764Individual Retirement Accounts / Finance / Economy / Money / Retirement plans in the United States / Individual retirement account / Roth IRA / Securities Investor Protection Corporation / Traditional IRA / Security / 401 / Provisional Irish Republican Army

        IRA APPLICATION COMPLETE YOUR E*TRADE APPLICATION IN THREE EASY STEPS The IRA Application you requested begins on the following page. To complete your application, simply: 1. SCROLL DOWN AND FILL OUT EACH FIELD BY TYPIN

        Add to Reading List

        Source URL: content.etrade.com

        Language: English - Date: 2015-12-02 12:53:58
        765

        T2Flex Benefits of Hosting Superior Reliability and Security When T2 hosts your T2 Flex™ application, your organization will realize new efficiencies, costs savings and improved customer service. T2 focuses on technolo

        Add to Reading List

        Source URL: www.t2systems.com

        Language: English - Date: 2015-06-25 22:45:12
          766Finance / Economy / Money / Stock market / Financial markets / Primary dealers / Financial institutions / Margin / Security / Short / Citigroup / JPMorgan Chase

          PORTFOLIO MARGIN BUSINESS BROKERAGE ACCOUNT APPLICATION COMPLETE YOUR E*TRADE APPLICATION IN THREE EASY STEPS The Portfolio Margin Business Brokerage Account Application you requested begins on the following page.

          Add to Reading List

          Source URL: content.etrade.com

          Language: English - Date: 2016-02-24 12:36:54
          767

          The Evolution of Enterprise Application Security Why enterprises need runtime application self-protection

          Add to Reading List

          Source URL: www.ciosummits.com

          Language: English - Date: 2015-03-16 10:48:42
            768Computer network security / Software testing / Computing / Computer security / Cyberwarfare / OWASP / Web application security / Application security / Black-box testing / Acceptance testing / Penetration test / Test automation

            1 Testing Guide 4.0 Project Leaders: Matteo Meucci and Andrew Muller Creative Commons (CC) Attribution Share-Alike

            Add to Reading List

            Source URL: www.owasp.org

            Language: English - Date: 2014-09-24 14:15:00
            769

            Poster: Designing a Persuasive Application to Improve Organizational Information Security Policy Awareness, Attitudes and Behavior Marc Busch1, Peter Wolkerstorfer1, Christina Hochleitner1, Georg Regal1, Manfred Tschelig

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2014-07-06 08:47:40
              770

              IMPROVING VULNERABILITY MANAGEMENT EFFECTIVENESS WITH APPLICATION SECURITY MONITORING How runtime application security monitoring helps enterprises make smarter decisions on remediation

              Add to Reading List

              Source URL: prevoty.com

              Language: English - Date: 2015-06-14 17:21:14
                UPDATE