Penetration test

Results: 1186



#Item
531Cyberwarfare / Software testing / Crime prevention / National security / OWASP / Penetration test / Vulnerability / Validation / Information security / Computer security / Security / Computer network security

The Risks that Pen Tests don’t Find • • •

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-05-21 21:36:27
532Crime prevention / Computer security / Data security / Computer network security / Information security / Security guard / Academi / Penetration test / Corporate security / Security / Public safety / Prevention

The International Code of Conduct for Private Security Service Providers Signatory Companies New Signatory Companies on 1 September[removed]Al Sajer

Add to Reading List

Source URL: www.icoc-psp.org

Language: English - Date: 2014-01-20 09:17:13
533Security / Software testing / OWASP / Penetration test / Threat model / Vulnerability management / Vulnerability / Software development process / Software bug / Computer security / Computer network security / Cyberwarfare

No reason to be SAD? The Integration of a Secure Software Development Life Cycle in OSS Enterprise Web Applications OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:25
534Geotechnical engineering / Earthquake engineering / Soil / Seismology / Seismic microzonation / Soil liquefaction / Cone penetration test / Geotechnical investigation / Shear strength / Civil engineering / Geology / Mechanics

Microsoft Word - _agileproceedings0402.doc

Add to Reading List

Source URL: www.agile-online.org

Language: English - Date: 2006-04-11 10:56:04
535Computer network security / Penetration test / Software testing / Hacker / Hack / Computing / Hacking / Electronics

Compass Security AG Provider of Hacking-Lab Compass Security AG Werkstrasse 20 CH-8645 Jona (Schweiz) +[removed]60

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:21
536Security / Vulnerability / Threat / Attack / Information security / Malware / Consensus audit guidelines / Network security / Penetration test / Computer security / Computer network security / Cyberwarfare

Security Exchange Commission Risk Alert Reference Guide June 11, 2014 (Revision 1) Table of Contents

Add to Reading List

Source URL: static.tenable.com

Language: English - Date: 2014-06-10 09:16:27
537Computing / Software testing / Global Information Assurance Certification / Penetration test / Information technology audit / SANS Institute / Metasploit Project / Computer forensics / Network security / Computer security / Cyberwarfare / Computer network security

THE MOST TRUSTED NAME IN INFORMATION AND SOFTWARE SECURITY TRAINING Seattle 2014 Seattle, WA Sept 29 - Oct 6

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-06-23 11:03:36
538Computing / OWASP / Cyberwarfare / Cryptographic protocols / Secure communication / WebScarab / Penetration test / HTTP Secure / Man-in-the-middle attack / Computer network security / Computer security / Security

mitmproxy.org How MITMproxy has been slaying SSL Dragons OWASP April[removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-05-24 00:07:20
539Security / Information technology audit / Hacking / Vulnerability / Application security / Password / Social vulnerability / Penetration test / Computer security / Software testing / Cyberwarfare

Microsoft PowerPoint - fortify-bjenkins-AppSecStrategy[removed]Read-Only] [Compatibility Mode]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:17
540Cyberwarfare / Stonesoft Corporation / Common Criteria / Penetration test / Stateful firewall / Computer network security / Computer security / Computing

Certification Report StoneGate FW/VPN 5.2.5

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2012-01-26 03:15:58
UPDATE