Hacking tool

Results: 25



#Item
11Computer security / Program analysis / Hacking / Vulnerability / Cross-platform software / Coverity / Static program analysis / Common Vulnerabilities and Exposures / Software assurance / Software testing / Software / Cyberwarfare

Special Publication[removed]Report on the Third Static Analysis Tool Exposition (SATE[removed]Editors: Vadim Okun

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:58
12Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2007-09-17 15:17:21
13Program analysis / Software quality / Computer security / Hacking / Vulnerability / Static program analysis / Software assurance / Software testing / Software engineering / Evaluation

Static Analysis Tool Exposition

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:58
14Hacking / Military technology / Spreadsheet / Computer security / War / Security / Cyberwarfare / Electronic warfare

THE CREST CYBER SECURITY INCIDENT RESPONSE MATURITY ASSESSMENT TOOL A. Overview CREST has developed a maturity model to help you assess the status of your cyber security incident response capability. This model has been

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2015-03-05 07:19:56
15Cross-platform software / Software testing / Hacking / Vulnerability / C / Buffer overflow / Null / Pointer / Find / Computing / Software engineering / Computer programming

Analysis procedure overview The goals of analysis are: To collect various numbers for test cases and/or tool reports, e.g., numbers of true tool warnings by weakness category. To estimate tool overlap (to what degree do

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:56:14
16Cyberwarfare / Crime prevention / Software testing / Hacking / Vulnerability / Security guard / Information security / Security / Computer security / Data security

Security Assessment Tool Security Assessment Tool The Child Support Program has recently made tremendous strides. In the early 90’s the program was in the planning stages and had some automation. In the late 90’s

Add to Reading List

Source URL: www.acf.hhs.gov

Language: English - Date: 2012-09-13 17:12:39
17News media / News conference / Public opinion / Media bias / United Kingdom / News International phone hacking scandal / Journalism sourcing / Public relations / Press release

����� ����������� The news media is a tool for reaching a large audience quickly. However, unless you are submitting an advertisement or public service announcement, only the news media de

Add to Reading List

Source URL: epa.gov

Language: English - Date: 2010-09-29 10:06:01
18Software quality / Software testing / Computer network security / Program analysis / Hacking / Vulnerability / Application security / Static program analysis / Buffer overflow / Cyberwarfare / Software bugs / Computer security

Kestrel Technology The Next Generation Tool for Static Code Analysis: Proving the Absence of Critical Vulnerabilities in C Source Code The Company Kestrel Technology (KT) specializes in sound semantic static analysis wit

Add to Reading List

Source URL: www.kestreltechnology.com

Language: English - Date: 2014-09-26 13:23:09
19Cyberwarfare / Software testing / Hacking / Vulnerability / Social vulnerability / Hazard / CVSS / Critical infrastructure protection / Security / Risk / Computer security

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES Terrorism Threat Vulnerability Self Assessment Tool Dear Industry Partner, The Terrorism Threat Vulnerability Self Assessment tool is a guide to help you bette

Add to Reading List

Source URL: www.ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
20Computer security / Hacking / Software testing / Vulnerability / Risk / Management / Ethics / Actuarial science

IT Program Assessment NPPD- Infrastructure Security Compliance Program (ISCP)-Chemical Security Assessment Tool (CSAT)

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2010-06-24 10:17:46
UPDATE