Penetration

Results: 2049



#Item
301Computer network security / Software testing / Metasploit Project / Shellcode / Exploit / Nmap / Netcat / Hacker / Attack / Software / Computing / Computer security

    Penetration  Testing  with  Kali  Linux  

Add to Reading List

Source URL: www.offensive-security.com

Language: English - Date: 2014-03-20 10:23:43
302ERP software / Microsoft / Microsoft Dynamics GP / Computer network security / Password / Microsoft Dynamics / Dexterity programming language / Microsoft SQL Server / Penetration test / Business / Accounting software / Business software

Cash is King: Who’s Wearing Your Crown? Accounting Systems Fraud in the Digital Age Tom Eston – SecureState Brett Kimmell, CPA – SecureState

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 14:09:49
303Electric power / Utility frequency / Inertia

Power System Disturbances and Inertia Support from Wind Farms Inertia Support Strategies using Wind Turbines for Low-Inertia Power System with High Penetration of Wind Power Mattias Persson

Add to Reading List

Source URL: www.elforsk.se

Language: English - Date: 2015-04-21 12:04:30
304Computer network security / Rapid7 / Penetration test / Attack / Hacker / Computing / Software / Computer security

Success Story Rapid7 Conducts a Penetration Test for Eyelock

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-01-21 08:01:42
305Software testing / Security / Penetration test / OWASP / Vulnerability / Threat / Computer security / Cyberwarfare / Computer network security

Cash is King Who’s Wearing Your Crown? Accounting Systems Fraud in the Digital Age Tom Eston and Brett Kimmell Agenda

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 14:09:35
306Cartridge / Ammunition / Penetration / Hardpan

PDF Document

Add to Reading List

Source URL: www.fabco-inc.com

Language: English - Date: 2014-10-18 08:30:57
307Crime prevention / Computer network security / Public safety / Electronic commerce / Information security / Government Communications Headquarters / Penetration test / Internet-related prefixes / Information assurance / Security / National security / Computer security

Certificatin of Masters Degrees Providing a General, Board Foundation in Cyber Security

Add to Reading List

Source URL: www.cesg.gov.uk

Language: English - Date: 2014-05-07 00:20:19
308Security / Cyberwarfare / Crime prevention / National security / Penetration test / Quality assurance / Vulnerability / Information security / Application security / Software testing / Computer security / Computer network security

What makes Ambersail different? Our testing process is based upon experience. Not just of information security, but of years spent in software development, network management and operations

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
309Software testing / Security / Hacking / Vulnerability / Application security / Penetration test / Cross-site scripting / Software bug / Software security assurance / Cyberwarfare / Computer security / Computer network security

ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions ACROS Application Security Analysis Frequently Asked Questions 1. What is the ACROS Application Security Analysis?

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:08
310Computing / Credit cards / Computer security / Computer law / Business / Qualified Security Assessor / Payment Card Industry Data Security Standard / SecurityMetrics / Penetration test / Data privacy / Electronic commerce / Payment systems

ambersail_pcidss_assessment

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:06
UPDATE