Penetration

Results: 2049



#Item
931Distributed computing / Software distribution / Cloud computing / Software as a service / Software industry / Data center / Internet security / Penetration test / Qualys / Computing / Concurrent computing / Computer network security

Tech Briefing December[removed]v7 Final.pptx

Add to Reading List

Source URL: treasurystrategies.com

Language: English - Date: 2014-12-15 08:26:25
932Computing / OWASP / Penetration test / Application security / WebScarab / Web application security / Vulnerability / Computer network security / Computer security / Cyberwarfare

OWASP ROI: Optimize Security Spending using OWASP OWASP Austin

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:26
933Computer network security / OWASP / Application security / Cross-site request forgery / Cross-site scripting / Threat model / SQL injection / CCWAPSS / Penetration test / Cyberwarfare / Computer security / Security

Developing Secure Applications with OWASP Martin Knobloch [removed]

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:42:28
934Computer security / Public safety / Penetration test / Security / OWASP / Computer network security

The  OWASP  Application  Security  Code  of  Conduct  for  Government  Bodies        

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:25:13
935JavaServer Faces / Java specification requests / Java platform / Apache MyFaces / Java Platform /  Enterprise Edition / ASP.NET / Java Servlet / Padding oracle attack / Jspx-bay / Computing / Web application frameworks / Java enterprise platform

Dissecting Java Server Faces for Penetration Testing Aditya K Sood (Cigital Labs) & Krishna Raja (Security Compass) Version 0.1 August 25, 2011

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:39:31
936HP Quality Center / Test automation / HP QuickTest Professional / Acceptance testing / Load testing / Penetration test / Test script / System testing / Manual testing / Software testing / Evaluation / Quality management

        INDEPENDENT       TESTING  &  QA   SERVICES    

Add to Reading List

Source URL: www.kualitatem.com

Language: English - Date: 2014-07-24 03:02:42
937Computer network security / OWASP / Cross-site request forgery / Penetration test / BeanShell / DEVS / Plug-in / Computing / Computer security / Security

German OWASP Day 2012 The OWASP Foundation http://www.owasp.org

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-11-09 12:36:41
938Neuroscience / Perception / Neural networks / Neurophysiology / Perceptual learning / ACT-R / Neuroplasticity / Memory / Visual cortex / Mind / Cognitive science / Ethology

To appear in dialectica. Paper finalist of the dialectica 2012 essay prize on “Cognitive Penetration” Cognitive Penetration, Perceptual Learning, and Neural Plasticity Ariel S. Cecchi

Add to Reading List

Source URL: home.adm.unige.ch

Language: English - Date: 2014-03-22 05:51:48
939Security / OWASP / Software testing / Vulnerability / Threat / Penetration test / OWASP Mantra Security Framework / Computer security / Cyberwarfare / Computer network security

The  OWASP  Application  Security  Code  of  Conduct  for  Standards  Groups        

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2013-03-27 15:24:57
940Computer network security / Software testing / SQL / Data management / SQL injection / Web application security / Code injection / Penetration test / OWASP / Computer security / Cyberwarfare / Computing

One Click Ownage, Adventures of a lazy pen tester... Ferruh Mavituna Lead developer of netsparker

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:29
UPDATE