Penetration test

Results: 1186



#Item
291Global Information Assurance Certification / Standards / Penetration test / CompTIA / Cisco Career Certifications / Microsoft Certified Professional / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: www2.certification-partners.com

Language: English - Date: 2012-09-13 14:11:14
292Computing / Electronic commerce / Computer law / Computer security / Computer hardware / Payment Card Industry Data Security Standard / Penetration test / Conventional PCI / SecurityMetrics / Payment systems / Data privacy / Credit cards

Media Contacts Laura K. Johnson, Lindsay Goodspeed PCI Security Standards Council +[removed]removed]

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-03-27 14:57:39
293Software testing / Computer network security / Crime prevention / National security / Software security assurance / Vulnerability / Penetration test / Application security / Proprietary software / Security / Computer security / Cyberwarfare

Tips and Tricks Guide To tm Software Security Assurance

Add to Reading List

Source URL: www.principlelogic.com

Language: English - Date: 2009-08-04 07:42:58
294OWASP / Cyberwarfare / Penetration test / Application security / Computer network security / Computer security / Security

Welcome to the OWASP Greek Chapter Meeting Konstantinos Papapanagiotou OWASP Greek Chapter Leader Syntax IT Inc

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:39
295Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
296Evaluation / Computer security / Computer network security / Quality assurance / Software assurance / Vulnerability / Software security assurance / Penetration test / Application security / Software testing / Software quality / Cyberwarfare

Software Assurance Metrics And Tool Evaluation Las Vegas, Nevada, USA, June 27-30, 2005 P. E. Black Information Technology Laboratory

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:58
297Global Information Assurance Certification / Standards / Penetration test / CompTIA / Microsoft Certified Professional / Cisco Career Certifications / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: www.ciwcertified.com

Language: English - Date: 2011-05-20 13:18:12
298Computer network security / Software testing / Data management / SQL / SQL injection / Relational database management systems / Penetration test / Vulnerability / Web application security / Computing / Computer security / Cyberwarfare

The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

Add to Reading List

Source URL: www.dbnetworks.com

Language: English - Date: 2014-04-15 01:06:32
299Global Information Assurance Certification / Standards / Penetration test / CompTIA / Microsoft Certified Professional / Cisco Career Certifications / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: www2.certification-partners.com

Language: English - Date: 2012-09-13 14:10:22
300Evaluation / Systems engineering / Software assurance / Vulnerability / Software security assurance / Penetration test / National Institute of Standards and Technology / Test automation / Quality assurance / Software testing / Software quality / Software engineering

F E AT U R E S T O R Y SAMATE’s Contribution to Information Assurance by Paul E. Black

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
UPDATE