Penetration test

Results: 1186



#Item
241Computing / Software testing / Hacking / Data security / Hacker / Metasploit Project / Malware / Greg Hoglund / Penetration test / Computer security / Cyberwarfare / Computer network security

BLACK HAT USA 2009 ONSITE REGISTRATION FORM INSTRUCTIONS Use one form per registrant. Please forward the completed forms prior to your arrival to the event. The only methods of payment accepted are credit card, money ord

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:13
242Areva / Cyberwarfare / Crime prevention / National security / Computer security / Penetration test / Computer network security / Security / Technology

Cyber Security Program Overview AREVA is committed to being a trusted cyber security team member, supporting your ability to achieve cost-effective threat protection and regulatory compliance.

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2015-02-19 11:59:34
243Cyberwarfare / Security / Education in California / California Basic Educational Skills Test / Penetration test / Hacking / Electronic commerce / Vulnerability / Software testing / Computer network security / Computer security

CBEST FAQ FebruaryCBEST Frequently Asked Questions: February 2015 At this time, the UK Financial Authorities have only made CBEST available to firms and FMIs which they consider to be core to the UK financial syst

Add to Reading List

Source URL: www.bankofengland.co.uk

Language: English - Date: 2015-02-09 05:46:05
244Computer security / Cyberwarfare / Hacking / Crime prevention / National security / Attack patterns / Misuse case / Vulnerability / Penetration test / Software testing / Security / Computer network security

Building Security In Editor: Gary McGraw, Misuse and Abuse Cases: Getting Past the Positive

Add to Reading List

Source URL: cigital.com

Language: English - Date: 2013-11-26 20:39:33
245Computer network security / Software testing / Risk / Market research / Vulnerability / Cross-site scripting / Penetration test / Survey methodology / SQL injection / Cyberwarfare / Computer security / Security

Effort Estimates on Web Application Vulnerability Discovery

Add to Reading List

Source URL: www.hicss.hawaii.edu

Language: English - Date: 2012-12-08 23:54:39
246Computer network security / Software testing / Rapid7 / Cyberwarfare / Metasploit Project / W3af / Bain Capital Ventures / Penetration test / Bain Capital / Software / System software / Computer security

Rapid7 Secures $50 million in Series C Funding Funding from Technology Crossover Ventures Will Support Hiring Great People, Acquiring Innovative Companies and Accelerating International Expansion Boston, MA - November 17

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-29 09:06:07
247Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / Vulnerability management / Attack / Vulnerability / Information security / Computer security / Software / Cyberwarfare

Rapid7 partners with Spire Solutions to expand its reach in Middle East region Vulnerability Management and Penetration Testing Solutions now available to channel partners helping customers fight against cyber attacks Du

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-29 09:06:07
248Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / Kyoto Computer Gakuin / United States Department of Homeland Security / Software / Computer security / System software

KCG Joins with Rapid7 to Deliver World-class Cyber Penetration Testing and Vulnerability Assessment Services Partnership Creates a Powerful Resource for Government and Commercial Organizations to Secure Applications and

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-29 09:06:07
249Security / Software testing / Hacking / Vulnerability / Penetration test / Areva / Cross-site scripting / Attack / Social vulnerability / Computer security / Cyberwarfare / Computer network security

Vulnerability Assessment and Penetration Testing AREVA’s Vulnerability Assessments identify and quantify vulnerabilities, and provide recommendations to eliminate or mitigate the risk. Our Penetration Testing uses adva

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2014-06-17 12:21:47
250Statistics / Software testing / Psychometrics / Hacking / Penetration test / Vulnerability / Social engineering / Attack / Statistical hypothesis testing / Computer network security / Cyberwarfare / Computer security

Quantitative Penetration Testing with Item Response Theory Florian Arnold*, Wolter Pieters t and Marielle Stoelinga* *Formal Methods & Tools Group, Department of Computer Science University of Twente, Enschede, T he Neth

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2014-11-14 05:24:58
UPDATE