Security testing

Results: 3214



#Item
191Software / Computer security / System software / Computer network security / Software testing / Metasploit Project / Hacking / Exploit / Script kiddie

Metasploit 3.0 Metasploit 3.0: The Middle of the End of the End of the Middle? by Aaron Grothe, CISSP, NSA IAM/IEM, Security+

Add to Reading List

Source URL: www.nebraskacert.org

Language: English - Date: 2008-05-16 20:02:08
192Software testing / Hacking / Vulnerability / Printf format string / Computing / Competitiveness / Computer security / Economy

Jim.Butler.LessonsLearnedStaticAnalysisTools_OMG-SwASIG_061207.ppt

Add to Reading List

Source URL: swa.omg.org

Language: English - Date: 2006-12-14 08:55:18
193Software testing / Computer security / Computing / Economy / Payment Card Industry Data Security Standard / PA-DSS / Penetration test / Black-box testing / Vulnerability / Gray box testing / White-box testing / Application security

Standard: PCI Data Security Standard (PCI DSS) Version: 1.0 Date:

Add to Reading List

Source URL: www.pcisecuritystandards.org

Language: English - Date: 2015-04-08 11:48:31
194

PCI Security Standards Council bulletin on determination of PCI approval status for PTS devices December 07, 2011 As noted in the PCI PIN Transaction Security (PTS) Device Testing and Approval Program Guide, vendors may

Add to Reading List

Source URL: ja.pcisecuritystandards.org

Language: English - Date: 2011-12-07 08:33:47
    195Computer network security / Software testing / National security / Secure communication / Vulnerability / Application security / Software bug / Threat / Cross-site scripting / Cyberwarfare / Computer security / Security

    A Software Flaw Taxonomy: Aiming Tools At Security Sam Weber Paul A. Karger Amit Paradkar (samweber|karger|paradkar)@watson.ibm.com IBM Research Division

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:13
    196Cyberwarfare / Concurrency control / Software testing / Lock / OWASP / Vulnerability / Application security / Deadlock / Computing / Computer security / Threads

    CONCURRENCY VULNERABILITIES OWASP BOOKS OWASP Testing Guide : ~NZ$18 + pp

    Add to Reading List

    Source URL: www.owasp.org

    Language: English - Date: 2011-12-11 14:43:29
    197Computer network security / Software testing / Hacking / Vulnerability / Validation / Computer security / Cyberwarfare / Security

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2011-12-21 03:32:12
    198Hacking / Software testing / Vulnerability / Image scanner / Network vulnerability scan / Social vulnerability / SAINT / Port scanner / Computer security / Computing / Cyberwarfare

    FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide   Version 1.0

    Add to Reading List

    Source URL: www.fedramp.gov

    Language: English - Date: 2015-06-03 09:58:42
    199Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

    =================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:16
    200Software testing / Security / Software bugs / Hacking / Vulnerability / Flaw hypothesis methodology / Penetration test / Cyberwarfare / Computer security / Computer network security

    Naval Research Laboratory Washington, DCNRL/FRA Taxonomy of Computer Program

    Add to Reading List

    Source URL: cwe.mitre.org

    Language: English - Date: 2006-09-13 14:57:14
    UPDATE