Penetration

Results: 2049



#Item
611Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
612Evaluation / Computer security / Computer network security / Quality assurance / Software assurance / Vulnerability / Software security assurance / Penetration test / Application security / Software testing / Software quality / Cyberwarfare

Software Assurance Metrics And Tool Evaluation Las Vegas, Nevada, USA, June 27-30, 2005 P. E. Black Information Technology Laboratory

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:58
613Kinematics / Motion / Accelerometers / Impact / Force / Acceleration / Penetration / Velocity / Physics / Classical mechanics / Physical quantities

egu_logo_without_circle_grey

Add to Reading List

Source URL: www.nat-hazards-earth-syst-sci-discuss.net

Language: English - Date: 2014-02-10 05:42:54
614Global Information Assurance Certification / Standards / Penetration test / CompTIA / Microsoft Certified Professional / Cisco Career Certifications / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: www.ciwcertified.com

Language: English - Date: 2011-05-20 13:18:12
615Computer network security / Software testing / Data management / SQL / SQL injection / Relational database management systems / Penetration test / Vulnerability / Web application security / Computing / Computer security / Cyberwarfare

The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

Add to Reading List

Source URL: www.dbnetworks.com

Language: English - Date: 2014-04-15 01:06:32
616Global Information Assurance Certification / Standards / Penetration test / CompTIA / Microsoft Certified Professional / Cisco Career Certifications / Professional certification / CCIE Certification / System administrator / Computing / Education / Computer security

® C e r t i f i e d I n t e r n e t W e b P r o f e s s i o n a l CIW Web Security Series

Add to Reading List

Source URL: www2.certification-partners.com

Language: English - Date: 2012-09-13 14:10:22
617Evaluation / Systems engineering / Software assurance / Vulnerability / Software security assurance / Penetration test / National Institute of Standards and Technology / Test automation / Quality assurance / Software testing / Software quality / Software engineering

F E AT U R E S T O R Y SAMATE’s Contribution to Information Assurance by Paul E. Black

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
618Carbon nanotubes / Quantum mechanics / Charge carriers / Field electron emission / Carbon nanotube / Dipole / Electron / Work function / Chemical bond / Physics / Electromagnetism / Quantum chemistry

JOURNAL OF APPLIED PHYSICS 104, 014310 共2008兲 The roles of apex dipoles and field penetration in the physics of charged, field emitting, single-walled carbon nanotubes Jie Peng,1 Zhibing Li,1,a兲 Chunshan He,1 Guih

Add to Reading List

Source URL: yangtze.hku.hk

Language: English - Date: 2010-12-19 08:35:07
619Software / Software testing / Identity management / Password / Metasploit Project / Penetration test / Malware / Computer security / Cyberwarfare / Computer network security

Microsoft PowerPoint - valsmith_amesc_Meta-Post_Exploitation_063008-11.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:41
620Electricity generation / Photovoltaics / Photovoltaic system / Wind power

Project Subjects Trunk Power System Planning and Operation Under Large Penetration of Intermittent Generations Background and Objective The expected large penetration of renewable generations, especially photovoltaic gen

Add to Reading List

Source URL: criepi.denken.or.jp

Language: English - Date: 2010-12-28 01:56:57
UPDATE