Penetration test

Results: 1186



#Item
971Computer network security / Data security / National security / Information security / Federal Information Security Management Act / United States Department of Veterans Affairs / United States Department of Homeland Security / Vulnerability / Penetration test / Computer security / Security / Cyberwarfare

STATEMENT OF GEORGE J. OPFER INSPECTOR GENERAL DEPARTMENT OF VETERANS AFFAIRS BEFORE THE COMMITTEE ON VETERANS’ AFFAIRS

Add to Reading List

Source URL: www.va.gov

Language: English - Date: 2006-11-21 15:05:30
972Mechanics / Seismic hazard / Cone penetration test / Geologic map / Planetary science / Seismology / Seismic microzonation / Geophysics / Geology / Seismic refraction

Annual Project Summary November 1, 2006 Calculation and validation of a probabilistic seismic hazard assessment for the urban area of Evansville incorporating site effects NEHRP External Grant Award Number 05HQGR0033

Add to Reading List

Source URL: earthquake.usgs.gov

Language: English - Date: 2010-07-16 13:48:17
973Software bugs / Software testing / Hacking / SAINT / Buffer overflow / Vulnerability / Exploit / Stack buffer overflow / Cross-site scripting / Cyberwarfare / Computer security / Failure

SAINTwriter Exploit Report Report Generated: May 8, [removed]Introduction On May 7, 2011, at 12:35 PM, a penetration test was conducted using the SAINTexploitTM 7.8 exploit tool. The scan discovered a total of three live

Add to Reading List

Source URL: vulnerabilityassessment.co.uk

Language: English - Date: 2011-05-08 05:16:25
974Alaska / Arctic Ocean / West Coast of the United States / Penetration test / Physical security / Security / National security / Public safety

A FEDERAL, STATE AND MUNICIPAL PARTNERSHIP Alaska Land Mobile Radio Communications System Facility Security Penetration Procedure 200-2

Add to Reading List

Source URL: www.alaskalandmobileradio.org

Language: English - Date: 2014-04-07 14:59:08
975Sedimentology / Soil mechanics / Earthquake engineering / Soil liquefaction / Standard penetration test / Seismic hazard / Earthquake / New Madrid Seismic Zone / Soil / Geology / Mechanics / Seismology

1 Liquefaction susceptibility for the region of Evansville, IN USGS Final Technical Report #07HQGR0058 Date[removed]Version 9

Add to Reading List

Source URL: earthquake.usgs.gov

Language: English - Date: 2009-01-29 11:35:19
976Software testing / Computing / Hacking / Penetration test / White hat / Metasploit Project / Vulnerability / Cross-site scripting / Exploit / Computer security / Cyberwarfare / Computer network security

Confident African American business man

Add to Reading List

Source URL: pen-testing.sans.org

Language: English - Date: 2013-11-27 13:42:31
977Data security / Software testing / Computer network security / Information security / Configuration management / Vulnerability / Penetration test / Chief information security officer / National Security Agency / Security / Computer security / Computing

[removed][removed][removed]New York State Information Technology Standard No: NYS-S14-008

Add to Reading List

Source URL: www.its.ny.gov

Language: English - Date: 2014-04-24 13:31:52
978Earthquake engineering / Sedimentology / Cone penetration test / Soil liquefaction / Seismic hazard / New Madrid Seismic Zone / Standard penetration test / Paleoliquefaction / Earthquake / Geology / Seismology / Geography of the United States

Liquefaction Potential Mapping in Memphis and Shelby County, Tennessee Glenn J. Rix1 and Salome Romero-Hudock1 The Earthquake Hazards Program of the U.S. Geological Survey is developing seismic hazard maps for several ur

Add to Reading List

Source URL: earthquake.usgs.gov

Language: English - Date: 2012-07-23 19:01:29
979Cyberwarfare / Software testing / Crime prevention / National security / Vulnerability / Penetration test / Information security / Office of the Comptroller of the Currency / Computer network security / Security / Computer security

ALERT 2001–4 O OCC ALERT

Add to Reading List

Source URL: www.occ.gov

Language: English - Date: 2010-01-05 18:34:44
980Security / Software testing / Data security / National security / National Institute of Standards and Technology / Penetration test / Business telephone system / Vulnerability / Voice over IP / Computer network security / Computer security / Cyberwarfare

PBX vulnerability analysis : finding holes in your PBX before someone else does

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-05-09 11:14:53
UPDATE