Penetration test

Results: 1186



#Item
431Security / Computer crimes / Hacking / Software testing / National security / International Multilateral Partnership Against Cyber Threats / Penetration test / Attack / Vulnerability / Computer security / Computer network security / Cyberwarfare

MS logo_CMYK_REV_all white

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2015-01-15 19:46:19
432Payment systems / Security / Computing / Electronic commerce / Payment Card Industry Data Security Standard / Information security / Regulatory compliance / Information assurance / Penetration test / Computer security / Credit cards / Data privacy

SureCloud Logo_final_CMYK

Add to Reading List

Source URL: www.surecloud.com

Language: English - Date: 2014-03-12 14:39:21
433Electronic commerce / Computer security / Computer law / Business / Money / Payment Card Industry Data Security Standard / Payment card industry / Qualified Security Assessor / Penetration test / Data privacy / Payment systems / Credit cards

On the road to PCI compliance with NCC Group and Transport for London NCC Group was appointed by Transport for London (TfL) to ensure that all elements of its contactless payment technology system operated within the sco

Add to Reading List

Source URL: www.nccgroup.com

Language: English - Date: 2014-10-30 13:17:28
434Hacking / Military technology / Software testing / Cyberwarfare / Penetration test / War / Computer security / International Multilateral Partnership Against Cyber Threats / Next Generation Security Software Ltd / Computer network security / Security / Electronic warfare

Script The February[removed]THE NEWSLETTER KEEPING YOU CONNECTED WITH CREST

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2015-03-05 07:19:55
435Software testing / Hacking / Penetration test / Metasploit Project / Social engineering / White hat / Pass the hash / Exploit / Attack / Computer security / Cyberwarfare / Computer network security

F U T U R E P E N TE S TING

Add to Reading List

Source URL: counterhack.net

Language: English - Date: 2015-02-12 08:51:55
436Hacker / Computing / Computer network security / Software testing / Penetration test

About the Speaker Kevin Johnson CEO, Secure Ideas Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and applicati

Add to Reading List

Source URL: www.infosec-world.com

Language: English - Date: 2014-09-02 17:01:49
437Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
438Cross-platform software / Scripting languages / Software testing / High-level programming languages / Computer network security / Cross-site scripting / Vulnerability / Penetration test / Application security / Computing / Software engineering / Software

Exploring the Relationship Between Web Application Development Tools and Security Matthew Finifter University of California, Berkeley [removed]

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
439Software / Cyberwarfare / Metasploit Project / Penetration test / David Kennedy / Computer security / Computer network security / Software testing

About the Speaker David Kennedy Founder, Principal Security Consultant, TrustedSec LLC Dave Kennedy is founder and principal security consultant of TrustedSec - An information security consulting firm located in Clevelan

Add to Reading List

Source URL: www.infosec-world.com

Language: English - Date: 2014-09-02 16:47:18
440Security / Cyberwarfare / Crime prevention / National security / Penetration test / Vulnerability / Quality assurance / Information security / SecurityMetrics / Software testing / Computer security / Computer network security

Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2015-03-05 07:19:56
UPDATE