Penetration

Results: 2049



#Item
971Security / Software testing / OWASP / Penetration test / Threat model / Vulnerability management / Vulnerability / Software development process / Software bug / Computer security / Computer network security / Cyberwarfare

No reason to be SAD? The Integration of a Secure Software Development Life Cycle in OSS Enterprise Web Applications OWASP

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:25
972Geotechnical engineering / Earthquake engineering / Soil / Seismology / Seismic microzonation / Soil liquefaction / Cone penetration test / Geotechnical investigation / Shear strength / Civil engineering / Geology / Mechanics

Microsoft Word - _agileproceedings0402.doc

Add to Reading List

Source URL: www.agile-online.org

Language: English - Date: 2006-04-11 10:56:04
973

1 SIG: Web Application Penetration Testing – Was bringen automatisierte Tools? Motivation Der Markt und die Open Source Community bieten heute diverse Werkzeuge, die Web Application

Add to Reading List

Source URL: www.isss.ch

Language: German - Date: 2010-06-11 12:37:31
    974Computer network security / Penetration test / Software testing / Hacker / Hack / Computing / Hacking / Electronics

    Compass Security AG Provider of Hacking-Lab Compass Security AG Werkstrasse 20 CH-8645 Jona (Schweiz) +[removed]60

    Add to Reading List

    Source URL: www.csnc.ch

    Language: English - Date: 2015-02-10 04:35:21
    975Security / Vulnerability / Threat / Attack / Information security / Malware / Consensus audit guidelines / Network security / Penetration test / Computer security / Computer network security / Cyberwarfare

    Security Exchange Commission Risk Alert Reference Guide June 11, 2014 (Revision 1) Table of Contents

    Add to Reading List

    Source URL: static.tenable.com

    Language: English - Date: 2014-06-10 09:16:27
    976Computing / Software testing / Global Information Assurance Certification / Penetration test / Information technology audit / SANS Institute / Metasploit Project / Computer forensics / Network security / Computer security / Cyberwarfare / Computer network security

    THE MOST TRUSTED NAME IN INFORMATION AND SOFTWARE SECURITY TRAINING Seattle 2014 Seattle, WA Sept 29 - Oct 6

    Add to Reading List

    Source URL: www.sans.org

    Language: English - Date: 2014-06-23 11:03:36
    977Computing / OWASP / Cyberwarfare / Cryptographic protocols / Secure communication / WebScarab / Penetration test / HTTP Secure / Man-in-the-middle attack / Computer network security / Computer security / Security

    mitmproxy.org How MITMproxy has been slaying SSL Dragons OWASP April[removed]

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2012-05-24 00:07:20
    978Security / Information technology audit / Hacking / Vulnerability / Application security / Password / Social vulnerability / Penetration test / Computer security / Software testing / Cyberwarfare

    Microsoft PowerPoint - fortify-bjenkins-AppSecStrategy[removed]Read-Only] [Compatibility Mode]

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:17
    979Cyberwarfare / Stonesoft Corporation / Common Criteria / Penetration test / Stateful firewall / Computer network security / Computer security / Computing

    Certification Report StoneGate FW/VPN 5.2.5

    Add to Reading List

    Source URL: fmv.se

    Language: English - Date: 2012-01-26 03:15:58
    980Cyberwarfare / Stonesoft Corporation / Common Criteria / Penetration test / Stateful firewall / Computer network security / Computer security / Computing

    Certification Report StoneGate FW/VPN 5.2.5

    Add to Reading List

    Source URL: fmv.se

    Language: English - Date: 2012-01-26 02:52:19
    UPDATE