Security testing

Results: 3214



#Item
991Matousec / Evaluation / Software testing

Proactive Security Challenge report www.matousec.com, DIFINEX LTD Proactive Security Challenge report May 6, 2011

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2013-08-29 12:01:05
992Failure / Software testing / Hacking / Code injection / Machine code / Malware / Denial-of-service attack / Software bug / Vulnerability / Cyberwarfare / Computer security / Computer network security

Microsoft PowerPoint - ernst-ac-sosp-distributed.ppt [Compatibility Mode]

Add to Reading List

Source URL: www.sigops.org

Language: English - Date: 2009-10-13 13:30:10
993Education in the United States / General Educational Development / Antivirus software / Software / Evaluation / Matousec / Software testing / Education / Education in Canada

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report April 1, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-04-01 12:49:18
994Software / Computer security / Electronic warfare / Computer network security / Software testing / Qualys / Malware / Vulnerability / Attack / Computing / Cyberwarfare / Hacking

Document Malware Attacks Presented by Roland Cheung HKCERT HKCERT - Information Security Seminar (March)

Add to Reading List

Source URL: www.infosec.gov.hk

Language: English - Date: 2010-11-13 10:14:27
995Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Thought / Ethics / Common Criteria / Protection Profile / Security Target / National Voluntary Laboratory Accreditation Program / Validation / Evaluation / Computer security / National Information Assurance Partnership

National Information Assurance Partnership Common Criteria/ Evaluation and Validation Scheme Publication #5

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2014-04-24 08:49:21
996Cyberwarfare / Security / Penetration test / Password / Vulnerability / Prepared statement / Web application security scanner / Database testing / Software testing / Computer security / Computer network security

Date: [removed]Case Study: PENETRATION TESTING AUDIT Preface: Penetration testing AKA pen-testing is a process where a tester looks for exploitable vulnerabilities from within an IT infrastructure that may allow the t

Add to Reading List

Source URL: 2secure.biz

Language: English - Date: 2015-01-01 11:45:50
997Common Criteria / Common Criteria Testing Laboratory / Thought / Knowledge / Security Target / Evaluation / National Information Assurance Partnership / Protection Profile

National Information Assurance Partnership Common Criteria Evaluation and Validation Scheme ® ™

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2013-11-13 12:47:50
998Computer network security / Hacking / Security / Attack patterns / Vulnerability / Application security / Penetration test / Buffer overflow / Port scanner / Computer security / Cyberwarfare / Software testing

Matching Attack Signatures to Security Vulnerabilities in Software-Intensive System Designs

Add to Reading List

Source URL: collaboration.csc.ncsu.edu

Language: English - Date: 2013-04-11 05:18:10
999Safety / Prevention / First aid / Registered training organisation / Vocational education / Security / Education / Confined space rescue / Confined space / Hazards / Occupational safety and health

1 RTO[removed]Vocational Training Courses for Confined space entry, Height Safety, Gas Testing and Breathing Apparatus

Add to Reading List

Source URL: www.competencytraining.net.au

Language: English - Date: 2015-03-25 03:00:14
1000Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / Social vulnerability / Arbitrary code execution / Privilege escalation / Buffer overflow / Computer security / Cyberwarfare / Software

! [removed]: [removed]: [removed]: [removed]: [removed]:

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2005-05-20 17:27:56
UPDATE