Penetration

Results: 2049



#Item
541Statistics / Software testing / Psychometrics / Hacking / Penetration test / Vulnerability / Social engineering / Attack / Statistical hypothesis testing / Computer network security / Cyberwarfare / Computer security

Quantitative Penetration Testing with Item Response Theory Florian Arnold*, Wolter Pieters t and Marielle Stoelinga* *Formal Methods & Tools Group, Department of Computer Science University of Twente, Enschede, T he Neth

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2014-11-14 05:24:58
542Web 2.0 / Cystic Fibrosis Foundation / Facebook / Cystic fibrosis / Social media / Social networking service / Philabundance / Social penetration theory / Health / World Wide Web / Software

PENN STATE BRANDYWINE JANE E. COOPER HONORS PROGRAM DIVISION OF ARTS & HUMANITIES AND CIVIC & COMMUNITY ENGAGEMENT PROGRAM

Add to Reading List

Source URL: www.psu.edu

Language: English - Date: 2011-04-13 23:45:12
543Mobile telecommunications / New media / MHealth / Mobile phone / Internet / T-Mobile / Mobile Internet growth / Mobile telephony / Technology / Mobile technology / Electronics

Chapter 1 ICT Proliferation on a Worldwide Scale Part 1 Section 1 Rapid Worldwide ICT Proliferation Figureprovides snapshots of the mobile-phone penetration rate in 2000 and 2012 superimposed on a

Add to Reading List

Source URL: www.soumu.go.jp

Language: English - Date: 2014-11-12 21:14:14
544Microsoft Windows / Secure Shell / Windows XP / Computer security / Password / Common Gateway Interface / NX technology / Pwnie Awards / Software / Computing / System software

Vulnerability Report March 1, 2012 This report shows vulnerabilities found during this penetration test. Summary Vulnerabilities:

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
545Software testing / Computer security / Internet Explorer / Address space layout randomization / Adobe Acrobat / JavaScript / Vulnerability / Firefox / Universal 3D / Software / Computing / Cross-platform software

Client-side Vulnerability Report February 19, 2012 This report shows potential client application vulnerabilities found during this penetration test Summary

Add to Reading List

Source URL: www.advancedpentest.com

Language: English
546Computer network security / Software testing / Risk / Rapid7 / Metasploit Project / National security / Vulnerability / Penetration test / Social vulnerability / Computer security / Software / Cyberwarfare

``` Rapid7 Introduces Nexpose Ultimate, the First and Only Unified Solution for Vulnerability Management, Vulnerability Validation, and Controls Effectiveness Testing Innovative product improves overall network security

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-10-08 10:38:23
547Computing / Security / Software testing / Penetration test / Cisco Career Certifications / Cyber security standards / Certification / CCNA / Professional certification / Standards / Computer security / Computer network security

CAPABILITY STATEMENT CONTACT INFORMATION: 11928 Sheldon Rd Tampa, FlUSA

Add to Reading List

Source URL: www.mile2.com

Language: English - Date: 2014-06-17 13:09:38
548Computer network security / Software testing / Rapid7 / Metasploit Project / Data security / Security / Penetration test / Information security / Attack / Computer security / Software / Cyberwarfare

SC Magazine Readers Select Rapid7 As a Finalist in 2012 Awards for the Best Vulnerability Management Tool and Best SME Security Solution Readers Recognize Nexpose Enterprise and Metasploit Pro For Their Innovation Boston

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-29 09:06:07
549Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / HD Moore / Software / System software / Computer security

Metasploit Pro Training Menu Metasploit Webinar Metasploit Pro

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-03-26 11:34:29
550Computing / Computer network security / Hacking / Software bugs / Application security / Vulnerability / Penetration test / Attack patterns / Secure coding / Software testing / Computer security / Cyberwarfare

White paper The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2015-04-01 08:31:14
UPDATE