Penetration

Results: 2049



#Item
271Bullying / Innuendo / Queen / Comedy / Sociolinguistics

INNUENDO – An Advanced Penetration Testing tool for modeling Advanced Attackers INNUENDO raises the bar for the state of the art in persistence and data exfiltration solutions. Based on a flexible, modular architecture

Add to Reading List

Source URL: www.immunitysec.com

Language: English - Date: 2015-02-06 16:10:19
272Education / ECSA / Certified Hacking Forensic Investigator / Certified Ethical Hacker / Certified Information Systems Security Professional / CompTIA / Penetration test / Computer security / Computer network security / Computing

Cyber Security Warrior Program CompTIA – EC Council – ISC2 Certificate of Completion : 240 Clock Hours Overview The objective of this program is to prepare students to build a successful career in Cyber Security. Thi

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-11-01 16:24:53
273Cyberwarfare / Hacking / Software testing / Black Hat Briefings / Penetration test / Application security / Vulnerability / Johnny Long / Cisco Systems / Computing / Computer security / Computer network security

WARNING: Computer and network vulnerabilities will be revealed. Black Hat, Europe’s premier technical ICT security event, returns in 2005 to provide solutions to your security challenges. •Share information with hund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:16
274Fish / Cone penetration test / Shark

Geomil message to CPT mariners and other interested Please find below a short message on the successfully commissioned Geomil SHARK system last month. Geomil was approached by a client to advice about the possibilities o

Add to Reading List

Source URL: www.geomil.com

Language: English - Date: 2014-07-25 06:33:45
275Security / Software testing / Data security / Metasploit Project / Rapid7 / Information security / Vulnerability / Penetration test / Security risk / Computer security / Computer network security / Cyberwarfare

Risk Visibility and Management: How IT Security Teams Can Enable Speed With Control The world rotates around the sun at a speed of 67,000 miles per hour. That can feel slow when compared to how fast organizations need t

Add to Reading List

Source URL: www.aquion.com.au

Language: English - Date: 2014-03-26 20:54:42
276Cyberwarfare / Security / Hacking / Penetration test / Electronic commerce / Vulnerability / Quality assurance / Security testing / SAINT / Software testing / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
277ISECOM / Prevention / Penetration test / Public safety / Pete Herzog / Data security / Information security / Test automation / Software testing / Security / Computer security

INSTITUTE FOR SECURITY AND OPEN METHODOLOGIES OSSTMM 2.1. Open-Source Security Testing Methodology Manual Created by Pete Herzog

Add to Reading List

Source URL: www.tecnoteca.it

Language: English - Date: 2008-12-29 06:35:07
278Software testing / Risk / Hacking / Technology / Vulnerability / CVSS / Social vulnerability / SCADA / Penetration test / Computer security / Cyberwarfare / Computer network security

QSec: Supporting Security Decisions on an IT Infrastructure F.Baiardi, F. Corò, F. Tonelli, Dip. di Informatica, Univ. di Pisa L Guidi

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-21 09:55:13
279Firestop / Fire test / Penetration / Passive fire protection / Architecture / Construction

NSW Building Regulation Advisory Note BRAN No. 236 Contact: Building Systems Unit Phone: Fax:

Add to Reading List

Source URL: www.planning.nsw.gov.au

Language: English - Date: 2009-05-27 21:21:23
280Computing / Security / OWASP / Software testing / Penetration test / Application security / Web application security / Cross-site scripting / Threat model / Computer security / Cyberwarfare / Computer network security

OWASP CODE REVIEW GUIDE 2008 V1.1 © OWASP Foundation This document is licensed under the Creative Commons Attribution Share Alike 3.0 license. You must attribute your version to

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:26
UPDATE