Penetration test

Results: 1186



#Item
131Penetration test / Computer network security / Copyright law of the United States / Malware

Sean Coyne Consultant Ryan Kazanciyan Principal The Getaway Methods and Defenses for Data Exfiltration Black Hat DC 2011

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:14
132Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Global Information Assurance Certification / Consensus audit guidelines / Threat / Computer security / Computer network security / Cyberwarfare

DOC Document

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-03-02 09:54:06
133Computer network security / Computer security / Cyberwarfare / Software quality / Cross-site scripting / Penetration test / Security engineering / Cryptography / Software assurance / Security / Crime prevention / National security

Media Contact: Stacy Simpson SAFECodeFOR IMMEDIATE RELEASE

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 15:56:27
134Prevention / Information technology management / Risk analysis / Information security / IT risk / Cyberwarfare / International Multilateral Partnership Against Cyber Threats / Penetration test / Computer security / Data security / Security

PDF Document

Add to Reading List

Source URL: teiss.eu

Language: English - Date: 2015-01-30 12:52:04
135Hacking / Cyberwarfare / Software testing / Emirates Telecommunications Corporation / Penetration test / Hacker / Network security / Oracle Corporation / Telecommunications Regulatory Authority / Computer network security / Computing / Computer security

HITBSecConf2008 – Dubai Conference Kit Supported & Endorsed by Hack In The Box Security ConferenceDubai

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:53:31
136Cyberwarfare / Computer network security / National security / Penetration test / Pete Herzog / Application security / Health Insurance Portability and Accountability Act / Information security / Security testing / Software testing / Computer security / Security

Open-Source Security Testing Methodology Manual Created by Pete Herzog current version:

Add to Reading List

Source URL: www.tecnoteca.it

Language: English - Date: 2008-12-29 06:35:07
137Cross-site scripting / SOAP / WS-Security / Web Services Description Language / World Wide Web / Penetration test / Application security / XML / XML-Enabled Networking / Computing / Web standards / Web services

Attacking Web Services: The Next Generation of Vulnerable Enterprise Apps Web Services represent a new and unexplored set of securitysensitive technologies that have been widely deployed by large companies, governments,

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
138Telstra / Economy of Australia / Cyberwarfare / Australia / Computer network security / Software testing / Penetration test

Cyber Security Challenge Australia 2014 cyberchallenge.com.au

Add to Reading List

Source URL: cyberchallenge.com.au

Language: English - Date: 2014-03-18 20:29:20
139Borehole / Fall cone test / Technology / Geotechnical investigation / Standard penetration test / Cone / Penetrometer

105 Harrison Street, American Falls, IdahoU.S.A • • www.ams-samplers.com DYNAMIC CONE PENETROMETER USE AND OPERATING GUIDELINES BACKGROUND:

Add to Reading List

Source URL: www.ams-samplers.com

Language: English - Date: 2015-02-20 13:57:09
140Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:44:22
UPDATE