Penetration test

Results: 1186



#Item
151Management / Computer security / Auditing / Information technology audit / Assurance services / Penetration test / Information security / Risk / Audit / Data security / Security / Public safety

PDF Document

Add to Reading List

Source URL: www.netsafety.eu

Language: English - Date: 2015-03-19 08:28:47
152Cyberwarfare / Software testing / Hacking / National security / Penetration test / EarthLink / Vulnerability / White hat / Information security / Computer network security / Computer security / Security

PDF Document

Add to Reading List

Source URL: www.earthlinkbusiness.com

Language: English - Date: 2015-01-02 17:23:18
153Software testing / Computer network security / Data security / Information security / Common Criteria / Penetration test / Government Communications Headquarters / IT risk / Vulnerability / Security / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2015-04-17 11:20:18
154Computer network security / Software testing / National security / Application security / Vulnerability / Penetration test / OWASP / Web application security / Threat model / Computer security / Cyberwarfare / Security

PDF Document

Add to Reading List

Source URL: www.appsecure.com

Language: English - Date: 2012-03-07 22:36:34
155Software testing / SAINT / Hacking / Penetration test / Vulnerability / Nessus / Computer appliance / Computer security / Computer network security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2012-02-08 12:34:15
156Computer security / Cyberwarfare / Data / Penetration test / Database management systems / Code injection / SQL / Data management / SQL injection

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
157Computing / Software testing / Evaluation / Cyberwarfare / Application security / Penetration test / Quality assurance / Software development process / Software quality / Computer network security / Computer security / Security

El Al Synopsis El Al, Israel’s national airline, selected Seeker as their application security testing solution to be part of existing software quality assurance processes. Seeker is routinely used by El Al for testing

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:52
158Application security / Penetration test / Information security / Public safety / Cyberwarfare / Computer security / Security / ECI Telecom

ECI Telecom Synopsis ECI Telecom, a global telecommunication solutions provider, has chosen Seeker for application security testing throughout the software development lifecycle. Seeker has been chosen over other applica

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:18
159Computer network security / Software testing / Hacking / Cross-platform software / Application security / Vulnerability / Penetration test / Qualys / OWASP / Software / Computing / Computer security

At Raytheon Canada Limited, we are committed to both our customers and employees. Our division provides Mission Support, servicing the defence, security and aerospace sectors with a broad range of high technology product

Add to Reading List

Source URL: www.raytheon.ca

Language: English - Date: 2015-03-25 09:21:44
160Software testing / Computer network security / Web development software / Electronic commerce / ColdFusion / Penetration test / Cross-site scripting / Vulnerability / Adobe Systems / Computing / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: wwwimages.adobe.com

Language: English - Date: 2015-05-20 19:59:52
UPDATE