Penetration test

Results: 1186



#Item
31

FedRAMP Penetration Test Guidance VersionJuly 6, 2015 FedRAMP Penetration Test Guidance V1.0.1

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-07-06 10:05:39
    32Computer network security / Computer security / Computing / Cyberwarfare / OWASP / Web application security / Penetration test / Application security / Vulnerability / OWASP ZAP / WebScarab

    OWASP Omaha The Open Web Application Security Project Omaha Chapter What is OWASP? The Open Web Application Security Project (OWASP) is a 501(c)(3)

    Add to Reading List

    Source URL: www.nebraskacert.org

    Language: English - Date: 2012-09-21 01:17:47
    33Software testing / Computer security / Computing / Economy / Payment Card Industry Data Security Standard / PA-DSS / Penetration test / Black-box testing / Vulnerability / Gray box testing / White-box testing / Application security

    Standard: PCI Data Security Standard (PCI DSS) Version: 1.0 Date:

    Add to Reading List

    Source URL: www.pcisecuritystandards.org

    Language: English - Date: 2015-04-08 11:48:31
    34Acceleration / Earthquake engineering / Cyberinfrastructure / E-Science / Network for Earthquake Engineering Simulation / Packaging / Vibration / Data logger / Accelerometer / Cone penetration test / Telepresence / Shock

    PDF Document

    Add to Reading List

    Source URL: nees.ucla.edu

    Language: English - Date: 2012-09-04 16:08:08
    35Computer security / International relations / NATO / Penetration test / Military / Military units and formations of NATO / Cooperative Cyber Defence Centre of Excellence

    NATO Cooperative Cyber Defence Centre of Excellence (the Centre) is a NATO-accredited International Military Organisation dealing with education, consultation, lessons learned, research and development in the field of cy

    Add to Reading List

    Source URL: ccdcoe.org

    Language: English - Date: 2015-07-15 02:51:30
    36Software testing / Security / Software bugs / Hacking / Vulnerability / Flaw hypothesis methodology / Penetration test / Cyberwarfare / Computer security / Computer network security

    Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:14
    37Hacking / Clickjacking / Computer security / Software testing / Likejacking / Tapjacking / Penetration test / Like button / Cross-site request forgery / Computing / Facebook / Social engineering

    Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing and Clickjacking:

    Add to Reading List

    Source URL: 2011.zeronights.org

    Language: English - Date: 2011-12-28 02:05:06
    38Computing / Software testing / Hacking / Vulnerability / Penetration test / Exploit / Threat model / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2014-10-17 10:36:52
    39Risk / Software testing / Risk management / Data security / Penetration test / Threat / Vulnerability / IT risk management / Information Technology Security Assessment / Security / Computer security / Computer network security

    Complete Assessment Lifecycle

    Add to Reading List

    Source URL: www.wurldtech.com

    Language: English - Date: 2015-07-15 01:28:14
    40Cyberwarfare / Crime prevention / National security / Data security / Information security / Vulnerability / Threat / Penetration test / Security engineering / Security / Computer security / Computer network security

    Microsoft Word - Document7

    Add to Reading List

    Source URL: iet.ucdavis.edu

    Language: English - Date: 2015-05-11 13:14:38
    UPDATE