Penetration test

Results: 1186



#Item
41Prinya Hom-anek, CISSP, CSSLP, CRISC, SANS GIAC, GCFW President & Founder, ACIS Professional Centre, Thailand Member, (ISC)² Asian Advisory Board -------------------------------------------------------------------------

Prinya Hom-anek, CISSP, CSSLP, CRISC, SANS GIAC, GCFW President & Founder, ACIS Professional Centre, Thailand Member, (ISC)² Asian Advisory Board -------------------------------------------------------------------------

Add to Reading List

Source URL: www.informationsecurityasia.com

Language: English - Date: 2012-07-19 00:22:00
42Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-10-17 10:42:00
43About the Course  The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking professi

About the Course The majority of security and hacking tools used today by professional penetration testers and security auditors have been developed for the Unix/Linux environment. Therefore the ethical hacking professi

Add to Reading List

Source URL: www.silensec.com

Language: English - Date: 2014-04-29 06:17:24
44Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2012-10-13 08:46:57
45Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2014-02-10 06:15:57
46SecurityMetrics  External Vulnerability Scanning Criminals continually find new ways to exploit business networks and steal sensitive data. Find your business’ external network weaknesses and validate accurate security

SecurityMetrics External Vulnerability Scanning Criminals continually find new ways to exploit business networks and steal sensitive data. Find your business’ external network weaknesses and validate accurate security

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
47SecurityMetrics  Data Security Awareness Training Your business is only as secure as its weakest link. Get comprehensive Data Security Awareness Training for your employees to avoid a possible breach. Data Security Aware

SecurityMetrics Data Security Awareness Training Your business is only as secure as its weakest link. Get comprehensive Data Security Awareness Training for your employees to avoid a possible breach. Data Security Aware

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
48Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-07-12 10:38:54
49IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: ,p-ISSN: 2320-334X, Volume 12, Issue 2 Ver. VI (Mar - Apr. 2015), PPwww.iosrjournals.org Assessment of Liquefaction Potential Index f

IOSR Journal of Mechanical and Civil Engineering (IOSR-JMCE) e-ISSN: ,p-ISSN: 2320-334X, Volume 12, Issue 2 Ver. VI (Mar - Apr. 2015), PPwww.iosrjournals.org Assessment of Liquefaction Potential Index f

Add to Reading List

Source URL: www.iosrjournals.org

Language: English - Date: 2015-04-25 03:00:34
50SecurityMetrics  Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45