Penetration test

Results: 1186



#Item
471Cyberwarfare / Computing / Crime prevention / National security / Vulnerability / Penetration test / Application security / Software development process / Software engineering / Security / Computer security / Software testing

Software Security Gary McGraw, Ph.D. Cigital, Inc[removed]Ridgetop Circle Suite 400

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:05
472Security / OWASP / Software testing / Application security / Web application security / Vulnerability / Threat model / Threat / Penetration test / Computer security / Cyberwarfare / Computer network security

-[removed]The OWASP Application Security Code of Conduct for Standards Groups

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:19:49
473OWASP / Cyberwarfare / Application security / Web application security / Penetration test / Computer network security / Security / Computer security

-[removed]The OWASP Application Security Code of Conduct for Government Bodies

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:20:03
474Security / SAP / OWASP / Computer network security / ABAP / Penetration test / SAP NetWeaver / SAPgui / SAP AG / Computing / Software / Business software

Hardening of SAPĀ® HTTP- and Webservices Frederik Weidemann OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:40
475Statistics / Tests / Motorcycle helmet / National Highway Traffic Safety Administration / Bicycle helmet / Test method / Automobile safety / Penetration test / Transport / Helmets / Land transport

Microsoft Word - FINALRPT, feasibility study of 218.doc

Add to Reading List

Source URL: www.smf.org

Language: English - Date: 2011-03-06 01:49:07
476Electric power distribution / Electric power / Smart grid / Smart meter / Copyright law of the United States / Penetration test / Energy / Technology / Measurement

Advanced Metering Infrastructure Security John Sawyer, Senior Security Analyst Don C. Weber, Senior Security Analyst InGuardians, Inc.

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:41:58
477Computer network security / Software testing / Data security / Software development process / Vulnerability / Software engineering / Penetration test / Information security management system / Computer standard / Security / Computer security / Cyberwarfare

Building Security In Editor: John Steven, [removed] Gunnar Peterson, [removed] Essential Factors for Successful Software

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:27
478Crime prevention / Data security / Computer network security / Information security / Business continuity planning / Penetration test / Risk management / Cyber security standards / NIST Special Publication 800-53 / Security / Computer security / Public safety

NEW YORK STATE DEPARTMENTof FINANCIAL SERVICES TO:

Add to Reading List

Source URL: www.mayerbrown.com

Language: English - Date: 2014-12-11 13:46:50
479SAP AG / SAP implementation / Penetration test / Python / Windows / Computing / Software / Open Travel Alliance

CYBSEC-Publication-SAP_Penetration_Testing_sapyto

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:29
480Software testing / Computer network security / Hacking / Software bugs / Vulnerability / Application security / Windows / Privilege escalation / Penetration test / Computer security / Cyberwarfare / Computing

INSECURITY IN SECURITY SOFTWARE MORGENSTERN ET AL. INSECURITY IN SECURITY SOFTWARE Maik Morgenstern AV-Test GmbH, Klewitzstr. 7, 39112 Magdeburg,

Add to Reading List

Source URL: www.av-test.org

Language: English - Date: 2011-08-07 07:52:49
UPDATE