Security bug

Results: 244



#Item
81Software bug / Computer architecture / Role-based access control / Snapshot / Security / Microsoft Windows / Computing / Windows XP

VMware Mirage Release Notes 3.7 Contents Release Content ........................................................................................................................................ 1 Fixed Issues ...........

Add to Reading List

Source URL: www.vmware.com

Language: English - Date: 2013-02-12 05:22:19
82Survival kit / Management / Emergency management / Security / Kit / Disaster / Hiking equipment / Bug-out bag / Disaster preparedness / Survival skills / Public safety

Qld-CoA-Stylised-2LS-mono

Add to Reading List

Source URL: www.lockyervalley.qld.gov.au

Language: English - Date: 2013-10-14 01:13:28
83Portable software / Software testing / Software bugs / Firefox / Vulnerability / Cross-site scripting / Security bug / Responsible disclosure / Chromium / Software / Cloud clients / Google Chrome

An Empirical Study of Vulnerability Rewards Programs Matthew Finifter, Devdatta Akhawe, and David Wagner University of California, Berkeley \{ finifter, devdatta, daw\} @cs.berkeley.edu Abstract

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
84Computer network security / Crime prevention / National security / Computer security / Keypunch / Punched card / Software bug / Threat / Computer / Computing / Cyberwarfare / Security

Ul~UVlDUl~l1 000lDWVU\? UlD~V ~15lD~~15 ~" W15~l!)15

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-01-16 14:16:40
85Computing / Cryptographic protocols / Electronic commerce / Internet / Internet protocols / Transport Layer Security / Password / OpenSSL / Software bug / Secure communication / Security / Computer network security

What you need to know about the Heartbleed bug

Add to Reading List

Source URL: phys.org

Language: English - Date: 2015-03-08 11:20:21
86Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
87Safety / Security / Disaster preparedness / American Red Cross / Emergency / Survivalism / Bug-out bag / Public safety / Emergency management / Management

Fort Carson-MEDDAC News Be Smart: Be Prepared! By: Lindsay Huse, RN, Nurse Epidemiologist Walking in a winter wonderland is all fun and games until the snow is blowing so hard you can’t see, you can’t get your car ou

Add to Reading List

Source URL: evans.amedd.army.mil

Language: English - Date: 2012-12-21 14:45:25
88Crime prevention / National security / Computer security / Software assurance / Software development process / Application security / Software bug / Capability Maturity Model Integration / Requirement / Software development / Software quality / Computer network security

What can an Acquirer do to prevent developers from make dangerous software errors? OWASP AppSec DC 2012 April 5, 2012

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2012-04-18 21:59:35
89Software licenses / Computer law / Open-source software / Software bug / Vulnerability / Computer security / Open source software development / Software development process / Debian / Computing / Software / Security

Open Source in Security: Visiting the Bizarre∗ Fred B. Schneider Department of Computer Science Cornell University Ithaca, New York[removed]removed]

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2013-09-09 23:00:46
90Intelligence / WikiLeaks / Open source intelligence / Military intelligence / Robert David Steele / Open-source intelligence / Central Intelligence Agency / Julian Assange / Intelligence analysis / National security / Espionage / Security

Put enough eyeballs on it, no bug is invisible. xv The truth at any cost lowers all other costs. Foreword

Add to Reading List

Source URL: nabcommunities.com

Language: English - Date: 2014-07-16 14:33:13
UPDATE