Penetration test

Results: 1186



#Item
421Computing / Software testing / Vulnerability / Cross-site scripting / Penetration test / Application security / Web application security scanner / Web application security / SQL injection / Computer security / Cyberwarfare / Computer network security

Application Security Issues:

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
422Engineering geology / Civil engineering / Architecture / Engineering / Borehole / Cone penetration test / Standard penetration test / General contractor / Geoprofessions / Geology / Construction / Geotechnical engineering

Requirements on Qualifications and Experience for Registration as a Specialist Contractor in the Ground Investigation Field Works Category

Add to Reading List

Source URL: www.bd.gov.hk

Language: English - Date: 2013-06-28 05:39:35
423Computer network security / Software testing / National security / Vulnerability / OWASP / Application security / Penetration test / Cross-site scripting / Web application security / Computer security / Cyberwarfare / Security

WEB APPLICATION SECURITY February 2008 © The Government of the Hong Kong Special Administrative Region The contents of this document remain the property of, and may not be

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:30:26
424Computer network security / Software testing / Hacking / Cross-site scripting / Acunetix / Vulnerability / Penetration test / Web application security / SQL injection / Computer security / Cyberwarfare / Computing

Is your website hackable? Check with Acunetix Web Vulnerability Scanner As many as 70% of websites have vulnerabilities that could lead to the theft of sensitive corporate data such as

Add to Reading List

Source URL: www.acunetix.com

Language: English - Date: 2014-10-03 03:14:30
425Security / Hacking / National security / Penetration test / Software testing / Threat / Hacker / Information security / Computing / Computer security / Computer network security

Hacking  to  Get  Caught…   (Updated)  Thoughts  About  Adversary   Replica?on  and  Penetra?on  Tes?ng   Overview   • 

Add to Reading List

Source URL: files.sans.org

Language: English - Date: 2014-11-25 11:08:08
426Software testing / Auditing / Data security / Information Technology Security Assessment / Information security / Risk assessment / Penetration test / Vulnerability / Information technology security audit / Risk / Security / Computer security

  Information Security Animations - Security Risk Assessment And Audit (Script) Security Risk Assessment And Audit Security risk assessment is a process of identifying, analysing and understanding information assets,

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-02-24 20:59:08
427Software testing / Auditing / Data security / Information Technology Security Assessment / Information security / Risk assessment / Penetration test / Vulnerability / Information technology security audit / Risk / Security / Computer security

  Information Security Animations - Security Risk Assessment And Audit (Script) Security Risk Assessment And Audit Security risk assessment is a process of identifying, analysing and understanding information assets,

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2011-03-29 08:16:47
428Product certification / Materials science / Penetration test / Education in Hong Kong / Hong Kong Institute of Vocational Education / Software testing

Hong Kong Council for Testing and Certification Internship Opportunities in the Testing and Certification Industry for “Summer 2015”

Add to Reading List

Source URL: www.hkctc.gov.hk

Language: English - Date: 2015-03-02 21:34:37
429

ISACA VENICE Chapter Quaderni Vulnerability Assessment e Penetration Test Linee guida per l’utente di verifiche di terze parti sulla sicurezza ICT

Add to Reading List

Source URL: www.isaca.org

Language: Italian - Date: 2014-11-29 15:27:52
    430Cyberwarfare / Security / Electronic commerce / Credit cards / Payment Card Industry Data Security Standard / Penetration test / Vulnerability / Security testing / Security information and event management / Computer security / Computer network security / Software testing

    Rotherham Council reduces the cost and complexity of ICT security compliance with SureCloud® Rotherham Metropolitan Borough Council uses the SureCloud Platform to manage compliance processes and mitigate the risk of vul

    Add to Reading List

    Source URL: www.surecloud.com

    Language: English - Date: 2014-03-12 14:39:21
    UPDATE