Penetration

Results: 2049



#Item
361Aid / Criminal law / Crime / Political geography / Honduras / Republics / Murder

The Economist April 12thheaval in Egypt to Jumia.com, an online re- tailer. Internet penetration rose as people sought reliable news. And because the streets were rowdy, explains Mattia Perroni, Jumia’s boss in

Add to Reading List

Source URL: media.economist.com

Language: English - Date: 2014-04-10 05:46:44
362Computer network security / Software testing / National security / Application security / Vulnerability / Penetration test / OWASP / Web application security / Threat model / Computer security / Cyberwarfare / Security

PDF Document

Add to Reading List

Source URL: www.appsecure.com

Language: English - Date: 2012-03-07 22:36:34
363Roof / Architecture / Construction / Engineering / Building engineering / Passive fire protection / Penetration

PDF Document

Add to Reading List

Source URL: www-sbf.gemini.edu

Language: English - Date: 2014-12-31 14:13:46
364Software testing / SAINT / Hacking / Penetration test / Vulnerability / Nessus / Computer appliance / Computer security / Computer network security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2012-02-08 12:34:15
365Computer security / Cyberwarfare / Data / Penetration test / Database management systems / Code injection / SQL / Data management / SQL injection

PDF Document

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
366Electronic commerce / Mobile banking / Mobile content / Globalization / Poverty / Education / Development / Knowledge / Economics

GLOBAL FINDEX ACCOUNT PENETRATION Approximately 740 million young adults are unbanked 41% of adults in developing economies are banked—compared to 89% of adults in high-income economies

Add to Reading List

Source URL: siteresources.worldbank.org

Language: English - Date: 2013-05-13 09:03:25
367Computing / Software testing / Evaluation / Cyberwarfare / Application security / Penetration test / Quality assurance / Software development process / Software quality / Computer network security / Computer security / Security

El Al Synopsis El Al, Israel’s national airline, selected Seeker as their application security testing solution to be part of existing software quality assurance processes. Seeker is routinely used by El Al for testing

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:52
368Application security / Penetration test / Information security / Public safety / Cyberwarfare / Computer security / Security / ECI Telecom

ECI Telecom Synopsis ECI Telecom, a global telecommunication solutions provider, has chosen Seeker for application security testing throughout the software development lifecycle. Seeker has been chosen over other applica

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:18
369Computer network security / Software testing / Hacking / Cross-platform software / Application security / Vulnerability / Penetration test / Qualys / OWASP / Software / Computing / Computer security

At Raytheon Canada Limited, we are committed to both our customers and employees. Our division provides Mission Support, servicing the defence, security and aerospace sectors with a broad range of high technology product

Add to Reading List

Source URL: www.raytheon.ca

Language: English - Date: 2015-03-25 09:21:44
370Local loop / Fiber-optic communications / Electronics / Telephony / Fiber to the x / Access network / Fiber to the premises by country / Electronic engineering / Network architecture / Broadband

UAE Leads in the Global FTTH Market FTTH Council MENA study reveals regional uptake in FTTH technology Dubai, United Arab Emirates, 25 November 2014: The FTTH/B average penetration rate in the MENA region has reached 41.

Add to Reading List

Source URL: www.ftthcouncilmena.org

Language: English - Date: 2014-11-28 10:35:50
UPDATE