Security testing

Results: 3214



#Item
11

TRAFFIC CONTROL A proprietary feature of Crowdcontrol–improving control, visibility, and coverage for crowdsourced security testing COVERAGE IS KING! Crowdcontrol™ – A powerful all-in-one platform for simplified v

Add to Reading List

Source URL: pages.bugcrowd.com

- Date: 2017-12-19 13:14:28
    12

    UNDER THE HOODIE: Actionable Research from Penetration Testing Engagements By Bob Rudis, Chief Security Data Scientist, Rapid7, Inc. Tod Beardsley, Research Director, Rapid7, Inc.

    Add to Reading List

    Source URL: www.rapid7.com

    - Date: 2017-02-08 08:47:58
      13

      Andreas Dittrich, Philipp Reinecke Testing of Network and System Security 1 Testing of Network and System Security

      Add to Reading List

      Source URL: andreas-dittrich.eu

      - Date: 2007-07-03 14:11:21
        14

        Payment Card Industry (PCI) PIN Transaction Security (PTS) Device Testing and Approval Program Guide

        Add to Reading List

        Source URL: www.pcisecuritystandards.org

        - Date: 2015-07-31 10:02:05
          15

          Security Testing _edited

          Add to Reading List

          Source URL: img01.beyondsoft.com

          - Date: 2016-08-24 09:29:17
            16Computer security / Security / Cyberwarfare / Software testing / Cybercrime / Computer network security / Hacking / Cryptography / Vulnerability / Responsible disclosure / Phishing / Security testing

            RESPONSIBLE DISCLOSURE POLICY    1.  General  Information.  The  SiteLock,  LLC   (“SiteLock”)  Responsible  Disclosure  Policy  details  the  process  by  which  SiteLock  publicly  discloses 

            Add to Reading List

            Source URL: www.sitelock.com

            Language: English - Date: 2016-07-05 10:59:14
            17Usability / Humancomputer interaction / Software testing / Technical communication / Technology / User / Computing / Design

            THE UNIVERSITY OF BRITISH COLUMBIA Usability of Security Administration vs. Usability of End-user Security Panelists:

            Add to Reading List

            Source URL: cups.cs.cmu.edu

            Language: English - Date: 2006-03-31 18:06:57
            18Computer security / Security / Access control / Computer access control / XACML / PERMIS / Identity management / Role-based access control / Authorization / Model-driven security / PDP / Toolchain

            A Toolchain for Model-Based Design and Testing of Access Control Systems Said Daoudagh1 , Donia El Kateb2 , Francesca Lonetti1 , Eda Marchetti1 and Tejeddine Mouelhi3 1 Istituto di Scienza e Tecnologie dell’Informazio

            Add to Reading List

            Source URL: www.itrust.lu

            Language: English - Date: 2015-03-09 10:06:50
            19Software testing / Computer security / Computing / Software engineering / Codenomicon / Fuzz testing / Oulu University Secure Programming Group / Denial-of-service attack / Test automation / Security testing / American fuzzy lop / Fault injection

            Fuzzing Fuzzing: A Solution Chosen by the FDA to Investigate Detection of Software Vulnerabilities

            Add to Reading List

            Source URL: www.codenomicon.com

            Language: English - Date: 2016-07-06 08:58:36
            20Engineering / Software engineering / Unified Modeling Language / Software testing / Software / Software quality / Systems engineering / Pharmaceutical industry / Verification and validation / Model-based testing / Profile / Simulink

            Making Model-Driven Verification Practical and Scalable: Experiences and Lessons Learned Lionel Briand IEEE Fellow, FNR PEARL Chair Interdisciplinary Centre for ICT Security, Reliability, and Trust (SnT)

            Add to Reading List

            Source URL: sdl-forum.org

            Language: English - Date: 2014-10-14 21:11:07
            UPDATE