Codenomicon

Results: 114



#Item
41Software / Evaluation / Jabberd14 / Extensible Messaging and Presence Protocol / Jabberd2 / Codenomicon / Software testing / Fuzz testing / Computing

Fuzzing Windows Applications and Network Protocols Bachelor Thesis Department of Computer Science University of Applied Science Rapperswil Spring Term 2012

Add to Reading List

Source URL: eprints.hsr.ch

Language: English - Date: 2012-08-31 07:45:13
42Validity / Systems engineering / Codenomicon / Evaluation / Technology / Science / Verification and validation / Validation / Verification / Software testing / Computer network security / Pharmaceutical industry

CodeVerify A New Level of Security & Robustness Verification Codenomicon is the industry leader in bringing strength in visibility to connected systems and devices through a next-generation suite of tools and services th

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:16
43Security / Verification and validation / Computer security / Evaluation / Business / Computer network security / Software testing / Codenomicon

CodeVerify A New Level of Security & Robustness Verification Codenomicon is the industry leader in bringing strength in visibility to connected systems and devices through a next-generation suite of tools and services th

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:16
44C dynamic memory allocation / Memory management / Buffer overflow / Computing / Fuzz testing / Software engineering / Computer network security / Codenomicon / Software testing / C Standard Library / Software bugs

Sam Hocevar ([removed]) — Hacker Space Festival — June 21st, 2008 OVERVIEW ● What’s fuzzing?

Add to Reading List

Source URL: caca.zoy.org

Language: English - Date: 2008-06-21 09:33:28
45Intelligence / Military intelligence / Defense Intelligence Agency / Central Intelligence Agency / Threat / Abuse / Intelligence cycle management / National security / Espionage / Security

AbuseSA Frequently Asked Questions AbuseSA is the cornerstone to an intelligence-driven strategy strategy to help governments and CERTs to rapidly respond to abusive activity. The situational awareness solution provides

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:14
46Internet / Internet protocols / Network protocols / IPv6 / Secure communication / Transport Layer Security / DHCPv6 / Universal Plug and Play / Dynamic Host Configuration Protocol / Computing / Network architecture / Internet standards

Defensics_TechSheet_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:16
47Cyberwarfare / Computer network security / Cryptographic software / Hacking / Codenomicon / OpenSSL / Vulnerability / Transport Layer Security / Debian / Computer security / Software testing / Computing

Heartbleed_story_2014-09-24

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:14
48Cyberwarfare / Computing / Codenomicon / Vulnerability / Software quality / Fuzz testing / Quality assurance / Fault injection / SAINT / Software testing / Computer network security / Computer security

Defensics_FAQ_LATEST_25Sept14.indd

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:16
49Software quality / Codenomicon / Quality assurance / Vulnerability / Test automation / Software testing / Computer security / Cyberwarfare

A Forrester Total Economic Impact™ Study Prepared For Codenomicon The Total Economic Impact Of Codenomicon’s Defensics Security Testing Suite Project Director: Michael Speyer July 2012

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:16
50Data security / Crime prevention / National security / Codenomicon / Computing / Public safety / CERT Group of Companies / Security information and event management / Information security / Security / Computer network security / Computer security

CERT-FI & Abuse Situation Awareness Case Study BACKGROUND CERT-FI is the Finnish national computer security incident response team whose task is to promote security in the information

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-02-12 16:33:14
UPDATE