Penetration test

Results: 1186



#Item
351Security / Computer network security / Hacking / Penetration test / Metasploit Project / Application security / Information technology security audit / Vulnerability / Cross-site scripting / Computer security / Cyberwarfare / Software testing

HIABTM Portable HIABTM Portable HIABTM Portable offers the ultimate flexibility for the on demand security scanning needs of professionals such as security managers,

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2015-03-17 07:47:53
352Security / Software testing / Crime prevention / National security / Vulnerability / Attack / Threat / Countermeasure / Penetration test / Computer network security / Cyberwarfare / Computer security

2-3 A Development of Experimental Environments “SIOS” and “VM Nebula” for Reproducing Internet Security Incidents MIWA Shinsuke and OHNO Hiroyuki Security incidents are growing significantly on a daily basis in t

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:47
353Mechanics / Geotechnical engineering / Cone penetration test / Seismology / Standard penetration test / Geotechnical investigation / Seismic hazard / Earthquake / Seismic microzonation / Civil engineering / Geology / Earthquake engineering

DIFFICULTIES IN ASSESSING LIQUEFACTION POTENTIAL FROM CONVENTIONAL FIELD TESTING Dr. Peter W. Mitchell1 and Carly Moore2 1. BEng MEng PhD CPEng MIEAust, Senior Principal Geotechnical Engineer, URS Australia Pty Ltd, Adel

Add to Reading List

Source URL: www.aees.org.au

Language: English - Date: 2013-11-30 06:24:34
354Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
355Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
356Software engineering / Software project management / Software development process / Software testing / Application security / Extreme programming / Penetration test / User story / Systems development life-cycle / Software development / Software / Agile software development

Agile development for Application security managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security into the proc

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-06 18:09:12
357Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
358Software engineering / Software project management / Software development process / Software testing / Application security / Extreme programming / Penetration test / User story / Systems development life-cycle / Software development / Software / Agile software development

Agile Development for Application Security Managers www.quotium.com When examining the agile development methodology many organizations are uncertain whether it is possible to introduce application security into the proc

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-06 18:09:12
359Software testing / Cloud computing / Software / Application firewall / Application security / Software as a service / Penetration test / Computing / Computer security / Computer network security

Press Release Paris, February 16, 2012 Deny All strengthens its leadership in the global application security market In 2011, Deny All shipped major new versions of its products and successfully deployed them

Add to Reading List

Source URL: www.denyall.com

Language: English - Date: 2015-02-25 04:56:01
360Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
UPDATE