Penetration test

Results: 1186



#Item
411Software review / Computer network security / Source code / Parasoft / Computer security / Adam Kolawa / Application security / Penetration test / Vulnerability / Software testing / Computing / Software

Parasoft Application Security Solution Improve Security without Impeding Development Productivity—Establish a Continuous Security Process Parasoft, the industry-leader in development-driven quality solutions, is now de

Add to Reading List

Source URL: www.parasoft.com

Language: English - Date: 2014-12-01 04:04:06
412Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
413Penetration test / Human behavior / Culture / British music / Software testing / Business continuity planning / Orchestral Manoeuvres in the Dark

HKEx Orion Market Data Platform (OMD) Derivatives Market Briefing on Readiness Test 12 December 2013 Changes are made on 3 Jan 2014 with highlights on the right margin with “|” (pages 29 – 31)

Add to Reading List

Source URL: www.hkex.com.hk

Language: English - Date: 2014-01-03 04:04:37
414Cyberwarfare / Computer network security / Penetration test / Information security / Evaluation / Vulnerability / Information assurance / Information technology audit process / Computer security / Software testing / Security

Interhack 5 E Long St 9th Fl Columbus, OH[removed]VOX +[removed]HACK FAX +[removed]

Add to Reading List

Source URL: web.interhack.com

Language: English - Date: 2013-01-04 13:33:30
415Computer network security / Software testing / Hacking / Cross-site scripting / Acunetix / Vulnerability / Penetration test / Web application security / SQL injection / Computer security / Cyberwarfare / Computing

Is your website hackable? Check with Acunetix Web Vulnerability Scanner As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data such as

Add to Reading List

Source URL: www.acunetix.com

Language: English - Date: 2014-10-03 03:14:30
416Centricom / Technology / Application security / Penetration test / Business / Online banking / Computing / Payment systems / Electronic commerce / Computer security

POLi Payments Security Summary POLi Payments puts security at the forefront of all product development and infrastructure deployment. As a result we encourage customers and merchants to educate themselves about POLi incl

Add to Reading List

Source URL: www.polipayments.com

Language: English - Date: 2014-04-06 23:50:52
417National security / Electronic commerce / Secure communication / Computing / Software engineering / Computer security / Application security / Penetration test / Defensive programming / Computer network security / Security / Crime prevention

Wouldn’t it be Nice …? secure enough for Paul E. Black secure enough

Add to Reading List

Source URL: buildsecurityin.us-cert.gov

Language: English - Date: 2013-05-15 07:43:19
418Computer network security / Cyberwarfare / National security / ISO/IEC 27001 lead auditor / Information security / Security controls / ISO/IEC 27001 / Penetration test / Vulnerability / Security / Data security / Computer security

INFORMATION SECURITY WE BELIEVE IN PUBLIC SECTOR EXCELLENCE

Add to Reading List

Source URL: www.iab.nsw.gov.au

Language: English - Date: 2013-03-20 00:20:24
419Computing / Software testing / Hacking / Cross-site scripting / Vulnerability / Application security / SQL injection / Penetration test / Web application security scanner / Computer security / Cyberwarfare / Computer network security

== Introduction and Motivation ==

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
420Software testing / Computer network security / Cloud computing / Veracode / Vulnerability / Application security / Cross-site scripting / Penetration test / Software bug / Computer security / Cyberwarfare / Computing

CUSTOMER SUCCESS EXAMPLE: For a Global 2000

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2014-04-28 11:00:59
UPDATE