Qualys

Results: 208



#Item
171Computer network security / Qualys / Cloud computing / Application firewall / Data security / Philippe Courtot / Application security / Web Access Management / Infrastructure optimization / Computer security / Computing / Cyberwarfare

1/2 PRESS RELEASE[removed]

Add to Reading List

Source URL: www.bee-ware.net

Language: English - Date: 2013-02-28 11:15:54
172Qualys / Social vulnerability

Brochure More information from http://www.researchandmarkets.com/reports[removed]Global Vulnerability Assessment Market[removed]Description:

Add to Reading List

Source URL: www.researchandmarkets.com

Language: English
173Cryptographic protocols / Internet / Internet protocols / Internet standards / Electronic commerce / Transport Layer Security / HTTP Strict Transport Security / Session hijacking / SSL acceleration / Cryptography / Secure communication / Computing

SSL Server Rating Guide version 2009i (8 December[removed]Copyright © [removed]Qualys SSL Labs (www.ssllabs.com) Abstract The Secure Sockets Layer (SSL) protocol is a standard for encrypted network communication. We feel

Add to Reading List

Source URL: www.ssllabs.com

Language: English - Date: 2015-01-19 14:14:14
174Qualys / Application security

SC Magazine WAS Ad_prefinal_V2

Add to Reading List

Source URL: software-security.sans.org

Language: English - Date: 2012-08-27 12:08:52
175Computer security / Computer network security / Spyware / Qualys / Bookmark / Academic degree / Espionage / Computing / Global Information Assurance Certification

Browser Maintenance Toolkit Russell Eubanks July 2011 GIAC GSEC, GCIA, GCIH, GPEN, GWAPT, GISP

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 18:45:04
176Computing / Imperva / Application firewall / Incapsula / Application security / Denial-of-service attack / Qualys / Database security / Web application security / Computer network security / Computer security / Cyberwarfare

DATASHEET Web Application Security Protect Your Critical Web Applications Protecting Web Applications from Online Threats Products

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2014-04-23 14:41:10
177Computer network security / Safenet / Juniper Networks / Qualys / FireEye /  Inc. / RSA / Ixia / Fortinet / Palo Alto /  California / Computing / Computer security / Technology

RSAC15_North_Hall_1-02-15

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-01-02 14:21:57
178Data security / Computer network security / Penetration test / Software testing / CompTIA / Global Information Assurance Certification / Microsoft Certified Professional / System administrator / Qualys / Computing / Education / Computer security

Direct Technology, founded in 1995, is one of the largest privately held custom software development firms on the West Coast, headquartered in Roseville, CA with an additional office in Bellevue, WA. Direct Technology’

Add to Reading List

Source URL: www.travisafrc.com

Language: English - Date: 2014-11-15 18:38:08
179Mitre Corporation / Open Vulnerability and Assessment Language / Mitre / Perl / The Oval / Computing / Software engineering / Software

OVAL Board Meeting[removed]Attendees Scott Armstrong – INADEV Corporation Jamie Cromer – Symantec Corporation Blake Frantz – Center for Internet Security Tigran Gevorgyan – Qualys, Inc.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2014-11-07 14:47:26
180Computing / Computer network security / Software testing / Trust seal / Cross-site scripting / Vulnerability / Cross-site request forgery / Qualys / SQL injection / Computer security / Cyberwarfare / Electronic commerce

Clubbing Seals: Exploring the Ecosystem of Third-party Security Seals Tom Van Goethem‡ , Frank Piessens‡ , Wouter Joosen‡ , Nick Nikiforakis† ‡ iMinds-Distrinet, KU Leuven, 3001 Leuven, Belgium

Add to Reading List

Source URL: www.securitee.org

Language: English - Date: 2014-11-26 15:35:04
UPDATE