Penetration

Results: 2049



#Item
841Software testing / Hacking / Penetration test / Metasploit Project / Social engineering / White hat / Pass the hash / Exploit / Attack / Computer security / Cyberwarfare / Computer network security

F U T U R E P E N TE S TING

Add to Reading List

Source URL: counterhack.net

Language: English - Date: 2015-02-12 08:51:55
842Hacker / Computing / Computer network security / Software testing / Penetration test

About the Speaker Kevin Johnson CEO, Secure Ideas Kevin Johnson is the Chief Executive Officer of Secure Ideas. Kevin has a long history in the IT field including system administration, network architecture and applicati

Add to Reading List

Source URL: www.infosec-world.com

Language: English - Date: 2014-09-02 17:01:49
843

About the Speaker Tom Eston Manager, Penetration Testing, Veracode Tom Eston is the Manager of Penetration Testing at Veracode. Tom currently leads a team of highly skilled penetration testers focused on web and mobile a

Add to Reading List

Source URL: www.infosec-world.com

- Date: 2015-01-23 11:27:22
    844Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

    An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:40
    845Cross-platform software / Scripting languages / Software testing / High-level programming languages / Computer network security / Cross-site scripting / Vulnerability / Penetration test / Application security / Computing / Software engineering / Software

    Exploring the Relationship Between Web Application Development Tools and Security Matthew Finifter University of California, Berkeley [removed]

    Add to Reading List

    Source URL: www.cs.berkeley.edu

    Language: English - Date: 2015-01-21 19:48:40
    846Software / Cyberwarfare / Metasploit Project / Penetration test / David Kennedy / Computer security / Computer network security / Software testing

    About the Speaker David Kennedy Founder, Principal Security Consultant, TrustedSec LLC Dave Kennedy is founder and principal security consultant of TrustedSec - An information security consulting firm located in Clevelan

    Add to Reading List

    Source URL: www.infosec-world.com

    Language: English - Date: 2014-09-02 16:47:18
    847Security / Cyberwarfare / Crime prevention / National security / Penetration test / Vulnerability / Quality assurance / Information security / SecurityMetrics / Software testing / Computer security / Computer network security

    Procuring Penetration Testing Services Procuring Penetration Testing Services Introduction

    Add to Reading List

    Source URL: www.crest-approved.org

    Language: English - Date: 2015-03-05 07:19:56
    848Cyberwarfare / Security / Penetration test / Hacking / Electronic commerce / Security testing / Application security / Vulnerability / OWASP / Software testing / Computer security / Computer network security

    Penetration Testing Services Procurement Guide VERSION 1 www.crest-approved.org

    Add to Reading List

    Source URL: www.crest-approved.org

    Language: English - Date: 2015-03-05 07:19:56
    849Crime prevention / Electronic commerce / National security / Secure communication / Penetration test / Computer network security / Security / Computer security

    Zürcher Tagung[removed]SICHERHEITSPRÜFUNGEN ERFAHRUNGEN Ivan Bütler

    Add to Reading List

    Source URL: www.isss.ch

    Language: English - Date: 2012-06-14 03:08:13
    850Government Communications Headquarters / Penetration test / Professional certification / Information security professionalism / CLAS consultant / Computer security / CESG Listed Advisor Scheme / Information Risk Management

    Cyber Security Professionalisation

    Add to Reading List

    Source URL: www.cesg.gov.uk

    Language: English - Date: 2014-04-28 07:44:34
    UPDATE