Penetration

Results: 2049



#Item
621Penetration test / United States / Defense Logistics Agency / Defense Information Systems Agency / Joint Interoperability Test Command

Microsoft PowerPoint[removed]EProcurement-r4-raw.pptx

Add to Reading List

Source URL: www.dote.osd.mil

Language: English - Date: 2012-12-27 12:07:59
622Centricom / Technology / Application security / Penetration test / Business / Online banking / Computing / Payment systems / Electronic commerce / Computer security

POLi Payments Security Summary POLi Payments puts security at the forefront of all product development and infrastructure deployment. As a result we encourage customers and merchants to educate themselves about POLi incl

Add to Reading List

Source URL: www.polipayments.com

Language: English - Date: 2014-04-06 23:50:52
623Computer network security / Software testing / Risk / Security / Rapid7 / Social vulnerability / Port scanner / Vulnerability / Penetration test / Computer security / Software / System software

Vulnerability Management Case Study Vulnerability Management assists with compliance for Hillsborough County Hillsborough County, situated midway along the west coast of Florida, includes the city of Tampa as its county

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2012-11-27 09:30:09
624

Security Scan e Penetration Testing esperienze di una realtà specializzata http://www.infosec.it [removed]

Add to Reading List

Source URL: www.infosec.it

Language: Italian
    625Centricom / Technology / Application security / Penetration test / Business / Online banking / Computing / Payment systems / Electronic commerce / Computer security

    POLi Payments Security Summary POLi Payments puts security at the forefront of all product development and infrastructure deployment. As a result we encourage customers and merchants to educate themselves about POLi incl

    Add to Reading List

    Source URL: polipayments.com

    Language: English - Date: 2014-04-06 23:50:52
    626Energy / Photovoltaics / Islanding / Power engineering / Electric power transmission / Power flow study / Control system / Grid-connected photovoltaic power system / Electromagnetism / Electric power / Electrical engineering

    2 Major Research Results Priority Subjects with Limited Terms ― Development of a Supply/Demand Infrastructure for Next-Generation Electric Power Assessment of System Security Assuming High Penetration of Photovoltaic

    Add to Reading List

    Source URL: criepi.denken.or.jp

    Language: English - Date: 2014-09-25 23:09:40
    627Renewable energy policy / Renewable-energy law / Technology / Photovoltaic system / Feed-in tariff / Islanding / Solar panel / Financial incentives for photovoltaics / Renewable energy / Energy / Photovoltaics

    Magnetic Island and Townsville Solar City A Case Study of Increasing PV Penetration in Electricity Networks System

    Add to Reading List

    Source URL: apvi.org.au

    Language: English - Date: 2014-05-06 20:36:13
    628Security / Software testing / Crime prevention / National security / Vulnerability / Penetration test / Nessus / Information security / Metasploit Project / Computer security / Cyberwarfare / Computer network security

    3 6 0 ° S e r v i c e . Fo c u s e d o n Yo u . Risk Advisory Services – Cyber Security Solutions Data security is no longer just an IT issue. Security incidents cost businesses millions of dollars each year. As syst

    Add to Reading List

    Source URL: www.elliottdavis.com

    Language: English - Date: 2015-01-28 17:05:26
    629Cybercrime / Phishing / Denial-of-service attack / Web threat / Malware / Internet security / Penetration test / Prolexic Technologies / Imperva / Computer network security / Cyberwarfare / Computer security

    2014 Crucial Cloud Hosting Crucial Research [WEB HOSTING SECURITY 2014]

    Add to Reading List

    Source URL: www.crucial.com.au

    Language: English - Date: 2014-08-23 20:56:38
    630Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Exploit / Attack / Information security / Computer security / Computer network security / Cyberwarfare

    Penetration Testing “Let us find your vulnerabilities before anyone else does.” A Penetration Test or Vulnerability Assessment is used to discover what an unauthorised individual(s) may be able to achieve when target

    Add to Reading List

    Source URL: www.securitywizardry.com

    Language: English - Date: 2013-01-25 17:48:05
    UPDATE