Penetration test

Results: 1186



#Item
101Computing / Security / OWASP / Software testing / Penetration test / Application security / Web application security / Cross-site scripting / Threat model / Computer security / Cyberwarfare / Computer network security

OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:26
102Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Social engineering / Application security / Attack / Computer security / Computer network security / Cyberwarfare

ACROS Security: ACROS Penetration Test, Frequently Asked Questions ACROS Penetration Test A Friendly “Advanced Persistent Threat” Simulation Frequently Asked Questions 1.

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:09
103Standards / Software testing / Computer network security / National security / Professional certification / Software engineering / Software assurance / Penetration test / Software engineer / Security / Computer security / Cyberwarfare

Security Engineering Training A Framework for Corporate Training Programs on the Principles of Secure Software Development April 20, 2009 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:49
104Cyberwarfare / Honeypot / Penetration test / Application security / Web application security / Network security / Vulnerability / Microsoft Security Essentials / Security / Computer network security / Computing / Computer security

HITBSecConf2007 - Dubai CONFERENCE KIT 2.0 * 20 Network Security Specialists and Researchers * 4-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods * Fundamental Defense Methodo

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:21
105Common Criteria / Security Target / Evaluation Assurance Level / Penetration test / Professional certification / Evaluation / Computer security / Thought

Indian CC Certification Scheme (IC3S) Certification Report Report Number: STQC/CCCR

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2013-01-03 08:45:30
106Cyberwarfare / Penetration test / Vulnerability / Network security / Hacker / Attack / Security / Managed security service / HD Moore / Computer network security / Computing / Computer security

HACK IN THE BOX SECURITY CONFERENCE 2003 BOOTH KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
107Computer network security / Hacking / Computer crimes / Phreaking / Mark Abene / Great Hacker War / Masters of Deception / Hacker / Penetration test / Cybercrime / Computing / Legion of Doom

HITBSecConf2007 - Malaysia

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:52:30
108Graphical user interface testing / Knowledge / Test / Course evaluation / Penetration test / Software testing / Education / Evaluation

13 Plagiarism prevention using automated tools * PJ Radcliffe † and H Rudolph RMIT University, Melbourne, Victoria

Add to Reading List

Source URL: www.engineersmedia.com.au

Language: English - Date: 2014-11-25 20:52:44
109Penetration test / Software testing / Copyright / All rights reserved / Law / Data / Information / Computer network security

Threat Actors and Vectors An Overview of the Current Cyber Bad Guys and Their Methods Warning

Add to Reading List

Source URL: wt4n6.com

Language: English - Date: 2012-12-06 18:22:16
110Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
UPDATE