Penetration test

Results: 1186



#Item
771Data security / Crime prevention / National security / Public safety / Information security / United States Patent and Trademark Office / Security controls / Penetration test / Peer-to-Patent / Security / Computer network security / Computer security

U.S. DEPARTMENT OF COMMERCE Office of Inspector General United States Patent and Trademark Office Stronger Management Controls Needed

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-11-03 12:44:54
772Computing / Data security / Public safety / National security / Penetration test / Information security / Risk management framework / United States Patent and Trademark Office / Federal Information Security Management Act / Computer security / Security / Computer network security

U.S. PATENT AND TRADEMARK OFFICE USPTO Deployed Wireless Capability with Minimal Consideration for IT Security

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-11-03 12:44:04
773Security / Hacking / Software testing / Electronic warfare / Attack / Penetration test / Security management / Vulnerability / Threat / Cyberwarfare / Computer security / Computer network security

Could Your Security Vulnerabilities Cause Network Gridlock? A Discussion Paper for Transportation Information Technology Leaders and Executives 2

Add to Reading List

Source URL: www.cgi.com

Language: English - Date: 2014-07-07 09:50:37
774Earthquake engineering / Sedimentology / Cone penetration test / Soil liquefaction / Seismic hazard / New Madrid Seismic Zone / Standard penetration test / Paleoliquefaction / Earthquake / Geology / Seismology / Geography of the United States

Liquefaction Potential Mapping in Memphis and Shelby County, Tennessee Glenn J. Rix1 and Salome Romero-Hudock1 The Earthquake Hazards Program of the U.S. Geological Survey is developing seismic hazard maps for several ur

Add to Reading List

Source URL: earthquake.usgs.gov

Language: English - Date: 2014-07-22 20:47:12
775Computing / Software testing / Security / Application security / Penetration test / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Cyberwarfare / Computer network security

Jumpstart a Web Application Secure Coding Program: A Five Step Process SANS STI Application Security Written Assignment Author:  Jim  Beechey,  [removed]   Advisor:  Johannes  Ulrich  

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-10-09 13:59:40
776Federal Information Security Management Act / Information security / Security controls / Vulnerability / Consensus audit guidelines / Penetration test / Risk management / Security risk / Application security / Computer security / Security / Cyberwarfare

Creating More Effective – and Strategic – Solutions Information Security Continuous Monitoring (ISCM) Strategy and Program Implementation Introduction

Add to Reading List

Source URL: www.verisgroup.com

Language: English - Date: 2014-06-12 08:09:38
777National security / Public safety / Risk / Computer security / Data security / Penetration test / Information security / Risk assessment / International Multilateral Partnership Against Cyber Threats / Security / Computer network security / Crime prevention

Examination Period Information is requested for the period January 1, 2013 through April30, 2014 (the "Examination Period") unless otherwise noted. Organizing the Information to be Provided Please provide the requested i

Add to Reading List

Source URL: wealthmanagement.com

Language: English - Date: 2014-07-11 12:42:35
778Materials science / Vickers hardness test / Rockwell scale / Indentation hardness / Brinell scale / Hardness / Shore durometer / Mohs scale of mineral hardness / Hardness comparison / Hardness tests / Mechanical engineering / Chemistry

HARDNESS TEST What is Hardness? Hardness is the property of a material that enables it to resist plastic deformation, usually by penetration. However, the term hardness may also refer to resistance to bending, scratching

Add to Reading List

Source URL: civil.eng.buffalo.edu

Language: English - Date: 2008-09-17 08:19:50
779Computer network security / Software testing / Crime prevention / National security / Vulnerability / Cross-site scripting / Penetration test / Internet Information Services / ASP.NET / Computer security / Cyberwarfare / Computing

ИНФОГРАФИКА_WEB

Add to Reading List

Source URL: www.ptsecurity.com

Language: English - Date: 2014-01-21 07:13:40
780Computer network security / Cyberwarfare / Computer law / Federal Information Security Management Act / Certification and Accreditation / Information security / Penetration test / Bureau of Industry and Security / Security controls / Computer security / Security / Data security

U.S. DEPARTMENT OF COMMERCE Office of Inspector General Bureau of Industry and Security FY 2009 FISMA Assessment of BIS IT Infrastructure (BI)

Add to Reading List

Source URL: www.oig.doc.gov

Language: English - Date: 2014-03-07 17:15:59
UPDATE