Penetration test

Results: 1186



#Item
551CompTIA / Management / Computer network security / Penetration test / Password / Risk / Public key certificate / Vulnerability / Multiple choice / Software testing / Computer security / Cyberwarfare

Sec 528 CASP Practice Exam 1.1

Add to Reading List

Source URL: files.ericconrad.com

Language: English - Date: 2013-05-14 12:36:30
552Stiffness / Physics / Mechanics / Cone penetration test / Cone / Geotechnical engineering / Soil

Microsoft Word - Auswertung.doc

Add to Reading List

Source URL: www.cces.ethz.ch

Language: English - Date: 2012-08-12 20:47:57
553Computing / Computer network security / Software testing / Certified Information Systems Security Professional / Information security / Penetration test / Security controls / Application security / Vulnerability / Data security / Computer security / Security

Microsoft Word - Security Engineer Positions_GIAC.docx

Add to Reading List

Source URL: www.giac.org

Language: English - Date: 2012-05-31 20:41:05
554Risk / Actuarial science / Emergency management / Risk management / Vulnerability / Penetration test / Governance /  risk management /  and compliance / IT risk management / Software testing / Computer security / Management

How can we get business to buy into application security? 0 Technology Governance, Risk and Controls

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
555Computing platforms / Software testing / BackTrack / KDE / Computer network security / Knoppix / Linux / Debian / Penetration test / Computing / Software / Cross-platform software

/ch/open Business Lunch Bern, am 8. Mai 2008 BackTrack: The Swiss Army Knife for IT Auditing Dr. Adrian Steinmann Webgroup Consulting AG 1

Add to Reading List

Source URL: www.ch-open.ch

Language: English - Date: 2011-02-08 02:35:23
556Computer network security / Software testing / Crime prevention / National security / Vulnerability / Penetration test / Consensus audit guidelines / Security testing / Federal Information Security Management Act / Computer security / Security / Cyberwarfare

Customer Type: U.S. Government National Security Laboratory Challenge Solution Validating vulnerability scanner results and preparing for

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-02-21 16:34:39
557Computer network security / Software testing / Scripting languages / Hacking / Ptrace / Unix / Penetration test / Python / Vulnerability / Computing / Computer programming / Software engineering

PTRACE SECURITY Information Security Solutions Python for Hackers Version 2.3

Add to Reading List

Source URL: ptrace-security.com

Language: English - Date: 2015-01-30 11:20:18
558SANS Institute / Computing / Software testing / Computer network security / Penetration test

WASHINGTON, DC | NOV[removed]Program Guide Chairman: Ed Skoudis #HackFestSummit

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2014-11-11 09:00:56
559Computer network security / Computing / Common Criteria / Protection Profile / Penetration test / Security Target / FIPS 140-2 / National Security Agency / Application firewall / Computer security / Security / Evaluation

Ärendetyp: 6 Diarienummer: 13FMV8867-44:1 Dokument ID FMVID[removed]HEMLIG/

Add to Reading List

Source URL: fmv.se

Language: English - Date: 2014-06-18 05:07:31
560Electric power distribution / Electric power / Smart grid / Smart meter / Copyright law of the United States / Penetration test / Energy / Technology / Measurement

Advanced Metering Infrastructure Security John Sawyer, Senior Security Analyst Don C. Weber, Senior Security Analyst InGuardians, Inc.

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 18:45:03
UPDATE