Penetration test

Results: 1186



#Item
191Educational psychology / Psychometrics / Architecture / Education / Fire protection / Penetration / Fire test / Joint / Validity / Passive fire protection / Building engineering / Safety

Exova Warringtonfire Aus Pty Ltd Suite 2002a, LevelMarket Street Sydney, New South Wales 2000 Australia

Add to Reading List

Source URL: www.tbafirefly.com.au

Language: English - Date: 2014-06-26 20:46:32
192Computer network security / Software testing / Data security / National security / Application security / Vulnerability / Information security management system / Software development process / Penetration test / Security / Computer security / Cyberwarfare

The State of Application Security A Research Study by Ponemon Institute LLC and Security Innovation The State of Application Security An Organizational Maturity study by

Add to Reading List

Source URL: www.securityinnovation.com

Language: English - Date: 2013-08-16 15:26:12
193Computing / Software testing / FireEye /  Inc. / Finansbank / Malware / Penetration test / Attack / Vulnerability / NX technology / Computer network security / Computer security / Cyberwarfare

CASE STUDY Leading Turkish Financial Services Provider, Finansbank, Safeguards Its Growing Global Presence with FireEye Network Security (NX)

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 23:14:44
194Software testing / Security / Electronic commerce / Application security / Penetration test / OWASP / Vulnerability / Password / Mobile Web / Computer security / Cyberwarfare / Computer network security

Report Mobile Application Security Study 2013 report

Add to Reading List

Source URL: www8.hp.com

Language: English
195Cyberwarfare / Computer network security / Data security / Penetration test / Vulnerability / Application security / Information security / Risk / Information technology security audit / Software testing / Security / Computer security

What is on your mind, is on your body Nikhil Wagholikar Practice Lead | Security Assessments & Digital Forensics Member, Mumbai OWASP Chapter

Add to Reading List

Source URL: www.clubhack.com

Language: English - Date: 2009-12-20 12:31:52
196Computer network security / Hacking / SAINT / Vulnerability / Penetration test / Social vulnerability / Debian / Computer security / Software testing / Cyberwarfare

» GROUP TEST l Vulnerability assessment With the evolution in today’s array of tools, the enterprise can now have vulnerability assessment any way it wants, says Peter Stephenson. have enjoyed watching the vulnerabili

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2011-02-14 07:47:51
197Federal Information Security Management Act / Information security / Vulnerability / Penetration test / Managed security service / Security risk / Application security / Security testing / Security controls / Computer security / Security / Cyberwarfare

Spotlight on Security A Modern Approach to Threat Protection, Detection, and Reactionwww.pcconnection.com

Add to Reading List

Source URL: info.pcconnection.com

Language: English - Date: 2015-04-14 09:10:28
198Cyberwarfare / Software testing / Crime prevention / National security / Penetration test / Application security / Vulnerability / Information security / Code audit / Computer security / Computer network security / Security

U.S. Public Sector HP Vulnerability Assessment Services Increase awareness of growing security threats At-A-Glance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:15
199Cyberwarfare / Crime prevention / National security / Electronic commerce / Denial-of-service attack / Intrusion prevention system / Information security / Penetration test / Prolexic Technologies / Computer network security / Security / Computer security

SOLUTION BRIEF DDoS Protection Services LOCAL SERVICE COAST TO COAST

Add to Reading List

Source URL: www.tierpoint.com

Language: English - Date: 2015-02-26 10:56:26
200Cyberwarfare / SQL / SQL injection / Cross-site scripting / Penetration test / Hacker / Insert / Code injection / Microsoft SQL Server / Computing / Data management / Relational database management systems

Website Security Website Planning How are websites “attacked”? • Access using stolen credentials Login details stolen using keyloggers etc.

Add to Reading List

Source URL: www.coursestuff.co.uk

Language: English - Date: 2015-01-28 07:05:34
UPDATE