Security testing

Results: 3214



#Item
181Computing / HTML / Markup languages / World Wide Web / Cascading Style Sheets / Web design / Cigital / XPath

Path X Explosive Security Testing Tools with XPath Many faces of security testing • Interesting questions

Add to Reading List

Source URL: www.tssci-security.com

Language: English - Date: 2013-01-16 12:15:25
182Computing / Software / Palamida / Security / Software testing / IBM software / Engineering Software Lab

PRODUCT BRIEF Palamida: Enterprise Edition Integration with IBM Rational ClearCase Extended Protection for Application Security

Add to Reading List

Source URL: www.palamida.com

Language: English - Date: 2015-04-27 14:04:59
183Computing / Internet / Computer security / Internet security / Transport Layer Security / Software testing / Cryptographic software / Cryptographic protocols / Heartbleed / OpenSSL / Codenomicon / Vulnerability

Heartbleed_story_2014-09-24

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-03-02 04:58:14
184

708 IEEE TRANSACTIONS ON INFORMATION FORENSICS AND SECURITY, VOL. 4, NO. 4, DECEMBER 2009 CAST: Canvass Audits by Sampling and Testing Philip B. Stark

Add to Reading List

Source URL: www.stat.berkeley.edu

Language: English - Date: 2009-12-14 13:22:08
    185

    Firm Says New Ebola Rapid Testing Technologies Will Detect Surface and Airborne Infectious Viruses in Minutes By: Homeland Security Today Staff:21am) — A new suite of mobile bio-detection technologies th

    Add to Reading List

    Source URL: www.pathsensors.com

    Language: English - Date: 2014-10-27 12:06:41
      186Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

      International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

      Add to Reading List

      Source URL: airccse.org

      Language: English - Date: 2011-11-30 01:55:07
      187

      Red Teaming Each organization has its own unique combination of needs, policies and tolerances that impact the way security assessments are conducted. This is especially true of Red Team penetration testing, which often

      Add to Reading List

      Source URL: www.casaba.com

      Language: English
        188

        Exhaustive Testing of Exception Handlers with Enforcer Cyrille Artho1 , Armin Biere2 , and Shinichi Honiden3 1 Research Center for Information Security (RCIS),

        Add to Reading List

        Source URL: staff.aist.go.jp

        Language: English - Date: 2015-11-26 00:31:19
          189Computer network security / Software testing / Computing / Computer security / Cyberwarfare / OWASP / Web application security / Application security / Black-box testing / Acceptance testing / Penetration test / Test automation

          1 Testing Guide 4.0 Project Leaders: Matteo Meucci and Andrew Muller Creative Commons (CC) Attribution Share-Alike

          Add to Reading List

          Source URL: www.owasp.org

          Language: English - Date: 2014-09-24 14:15:00
          190

          Separation of Transitions, Actions, and Exceptions in Model-based Testing Cyrille Artho Research Center for Information Security (RCIS), AIST, Tokyo, Japan Abstract. Model-based testing generates test cases from a high-l

          Add to Reading List

          Source URL: staff.aist.go.jp

          Language: English - Date: 2015-11-26 00:31:41
            UPDATE