Penetration test

Results: 1186



#Item
171Computing / Cyberwarfare / Electronic voting / Information society / Election fraud / Penetration test / Software independence / Application security / Vulnerability / Software testing / Election technology / Computer security

Software Review and Security Analysis of Scytl Remote Voting Software Michael Clarkson Brian Hay

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
172Professional certification / Evaluation / Chartered IT Professional / CESG Listed Advisor Scheme / Penetration test / Standards / Education / Computing

CESG Certified Professional Scheme Applicant FAQs Date: September 2014 Version: 3.0

Add to Reading List

Source URL: certifications.bcs.org

Language: English - Date: 2014-10-01 04:13:22
173Security / CVSS / Vulnerability / Penetration test / Information security management system / Phishing / Information security / Social engineering / Threat / Computer network security / Computer security / Cyberwarfare

Report from Dagstuhl SeminarSocio-Technical Security Metrics Edited by Dieter Gollmann1 , Cormac Herley2 , Vincent Koenig3 ,

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2015-04-17 07:47:57
174Hacking / Cyberwarfare / Computer network security / National security / Penetration test / Application security / Information security / White hat / Vulnerability / Software testing / Computer security / Security

Your texte here …. Corporate Presentation "Frost & Sullivan recommends that customers invest in annual ethical hacking assessments by leading companies such as High-Tech Bridge."

Add to Reading List

Source URL: www.htbridge.com

Language: English - Date: 2015-04-10 11:56:18
175Software testing / Security / Penetration test / Application security / Vulnerability / Attack / Security testing / Web application security / SCADA / Computer network security / Computer security / Cyberwarfare

Vulnerability_Assessment_Services_final-1pg.indd

Add to Reading List

Source URL: www.parsons.com

Language: English - Date: 2014-07-22 16:26:30
176Computer security / Software testing / Industrial automation / SCADA / Telemetry / United States Department of Homeland Security / Critical infrastructure protection / Penetration test / Vulnerability / Computer network security / National security / Security

Security ICS/SCADA CYBERSECURITY Critical Infrastructure Protection Solutions COMPANY OVERVIEW Founded in 1944, Parsons is

Add to Reading List

Source URL: www.parsons.com

Language: English - Date: 2015-02-12 19:15:42
177Computer network security / National security / Software testing / Phishing / Advanced persistent threat / Penetration test / Information security / Malware / Email address harvesting / Security / Computer security / Cyberwarfare

In Brief Changing threats: are you prepared? APT Simulation Threats are constantly changing

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2013-11-05 08:56:11
178Computer security / CompTIA / Wireless security / IEEE 802.1X / Penetration test / Network security / Password / Proxy server / Authentication / Computer network security / Security / Computing

CompTIA Security+ Certification Exam SY0-301 Days: 5 Prerequisites: CompTIA A+ Certification and CompTIA Network+ Certification or equivalent experience Description:

Add to Reading List

Source URL: www.lantecctc.com

Language: English - Date: 2014-05-22 12:57:17
179Seismology / Earthquake engineering / Earthquakes / Cone penetration test / Soil mechanics / Geotechnical engineering / Seismic hazard / Soil liquefaction / Earthquake / Geology / Civil engineering / Mechanics

Comparison of CPT Based Liquefaction Potential and Shear Wave Velocity Maps by Using 3-Dimensional GIS Muammer Tün, Uğur Avdan, Metin Altan, Can Ayday Anadolu University, Satellite and Space Sciences Research Institute

Add to Reading List

Source URL: itcnt05.itc.nl

Language: English - Date: 2005-02-27 17:00:00
180Computing / Computer network security / Hacking / Penetration test / Phishing / Metasploit Project / Social engineering / Hacker / Cross-site scripting / Software testing / Computer security / Cyberwarfare

Hack Yourself First A Beginner’s Guide to Penetration Testing   Copyright © 2013 by LCI Technology Group, LLC This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0

Add to Reading List

Source URL: averagesecurityguy.files.wordpress.com

Language: English - Date: 2015-01-07 13:03:36
UPDATE