Security testing

Results: 3214



#Item
101Software quality / Management / Quality / Software development process / Source code / Project management / Software / Software security assurance / Software testing

Microsoft Word - 121_Afrasinei_EN_Template_Final.doc

Add to Reading List

Source URL: www.amfiteatrueconomic.ro

Language: English - Date: 2014-01-26 16:55:52
102Internet Standards / Internet protocols / Computability theory / Daikon / Software testing / Domain Name System Security Extensions / Domain Name System / Freeciv / Programming language / Object Process Methodology / Specification language / Internet protocol suite

Inference and enforcement of data structure consistency specifications Brian Demsky1 , Michael D. Ernst2 , Philip J. Guo2 , Stephen McCamant2 , Jeff H. Perkins2 , Martin Rinard2 University of California at Irvine, Irvine

Add to Reading List

Source URL: pgbovine.net

Language: English - Date: 2014-01-03 23:24:44
103Comprehensive Nuclear-Test-Ban Treaty / Nuclear weapons testing / Geophysicists / Lassina Zerbo / Preparatory Commission for the Comprehensive Nuclear-Test-Ban Treaty Organization / Soviet UnionUnited States relations / Federica Mogherini / Nuclear proliferation / High Representative of the Union for Foreign Affairs and Security Policy / Partial Nuclear Test Ban Treaty

CTBTO / Symposium

Add to Reading List

Source URL: www.ctbto.org

Language: English - Date: 2016-07-22 05:43:15
104Cross-platform software / Optimizely / Functional languages / Scripting languages / Concurrent programming languages / Object-oriented programming languages / JavaScript / Security token / Experiment / Java

Optimizely Headline Testing Technical Implementation Guide 631 HOWARD ST. #100 SAN FRANCISCO, CA 94105

Add to Reading List

Source URL: blog.optimizely.com

Language: English - Date: 2015-05-20 18:31:10
105Software testing / Computer network security / Hacking / Vulnerability / GrammaTech / Computer security

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
106Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
107Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
108Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
109Actuarial science / Risk / Project management / Risk management / Security / Systems engineering / Sampling risk / Sampling / Risk assessment / Fair trade / Food

Codex Committee on Methods of Analysis and Sampling (34th Session) Budapest, Hungary (4-8 MarchEuropean Union comments on the Proposed Draft Principles for the Use of Sampling and Testing in International Food Tr

Add to Reading List

Source URL: www.nebih.gov.hu

Language: English
110Hacking / Software testing / Computer network security / Vulnerability / Cross-site scripting / Computer security / SQL injection

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
UPDATE