Penetration test

Results: 1186



#Item
441Cyberwarfare / Security / Penetration test / Hacking / Electronic commerce / Security testing / Application security / Vulnerability / OWASP / Software testing / Computer security / Computer network security

Penetration Testing Services Procurement Guide VERSION 1 www.crest-approved.org

Add to Reading List

Source URL: www.crest-approved.org

Language: English - Date: 2015-03-05 07:19:56
442Crime prevention / Electronic commerce / National security / Secure communication / Penetration test / Computer network security / Security / Computer security

Zürcher Tagung[removed]SICHERHEITSPRÜFUNGEN ERFAHRUNGEN Ivan Bütler

Add to Reading List

Source URL: www.isss.ch

Language: English - Date: 2012-06-14 03:08:13
443Government Communications Headquarters / Penetration test / Professional certification / Information security professionalism / CLAS consultant / Computer security / CESG Listed Advisor Scheme / Information Risk Management

Cyber Security Professionalisation

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2014-04-28 07:44:34
444Computer network security / Penetration test / Freedom of information legislation / Hacking / Government Communications Headquarters / Freedom of Information Act / Vulnerability / Skills Framework for the Information Age / Software testing / Computer security / Cyberwarfare

Application Guidance - CCP Penetration Tester Role, Practitioner level, Issue 1.0 August 2014

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2014-08-21 00:20:18
445Data security / Public safety / Crime prevention / National security / Information security / Penetration test / Security controls / Cyber security standards / Information Technology Security Assessment / Security / Computer security / Computer network security

Security Standard: Solutions Life Cycle Management Scope The standard applies to new IT services (including third-party and RIT-hosted, and software as a service) that meet any one or more of the following:  host or p

Add to Reading List

Source URL: www.rit.edu

Language: English - Date: 2014-07-17 13:14:03
446Computer security / Cyberwarfare / National security / Penetration test / Security testing / Information security / ISECOM / Social engineering / Attack / Software testing / Computer network security / Security

Two methodologies for physical penetration testing using social engineering Trajce Dimkov, Wolter Pieters, Pieter Hartel Distributed and Embedded Security Group University of Twente, The Netherlands {trajce.dimkov, wolte

Add to Reading List

Source URL: www.professionalsecuritytesters.org

Language: English - Date: 2010-02-04 15:49:59
447WORD / Penetration test / Hong Kong media / Harris Academy Bermondsey / Computer security / SANS Institute / Global Information Assurance Certification

PROGRAM GUIDE March 8-15, 2013 Orlando World Center Marriott Hotel

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-03-05 09:48:09
448Identity management / Crimes / Computer crimes / Password / Penetration test / Hacker / Phishing / Identity theft / Credential / Security / Computer network security / Computer security

With Russian Hackers Stealing over a Billion Credentials, Business Password Policies in the Spotlight With recent reports about Russian hackers assembling the largest recorded cache of stolen user credentials in history,

Add to Reading List

Source URL: www.prweb.com

Language: English - Date: 2014-08-09 03:59:52
449Computing / Cyberwarfare / Electronic voting / Information society / Election fraud / Penetration test / Software independence / Application security / Vulnerability / Software testing / Election technology / Computer security

Software Review and Security Analysis of Scytl Remote Voting Software Michael Clarkson Brian Hay

Add to Reading List

Source URL: election.dos.state.fl.us

Language: English - Date: 2008-09-24 15:22:04
450Cone penetration test / Geotechnical investigation / Shear / Fault / Earthquake / Thrust fault / Geology / Structural geology / Shear zone

SUBMARINE MASS MOVEMENTS WITHIN MONTEREY CANYON: BENTHIC DISTURBANCE CONTROLS ON THE DISTRIBUTION OF CHEMOSYNTHETIC BIOLOGICAL

Add to Reading List

Source URL: www.beg.utexas.edu

Language: English - Date: 2009-05-08 14:15:26
UPDATE