Security testing

Results: 3214



#Item
241Technology / Hacking / Computer network security / Computer security / Secure communication / SCADA / Vulnerability / Automation / Security testing / Software testing / Cyberwarfare / Security

Emerson Process Management Integrates Achilles Testing June 15, 2009 Wurldtech Announces The Latest Equipment Manufacturer To Select The Award-Winning Achilles Security & Robustness Testing Platform Demonstrating Continu

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-15 01:28:14
242Computing / Software testing / Electronic commerce / Hacking / SecurityMetrics / Penetration test / Vulnerability / Application security / Attack / Computer security / Cyberwarfare / Computer network security

SecurityMetrics Penetration Testing How do you really know if your sensitive data is secure? Even the best developers can accidentally miss secure coding steps, or fail to implement the latest secure coding practices.

Add to Reading List

Source URL: www.securitymetrics.com

Language: English - Date: 2015-07-14 12:51:45
243

Defying Logic Theory, Design, and Implementation of Complex Systems for Testing Application Logic Rafal Los & Prajakta Jagdale – HP Application Security

Add to Reading List

Source URL: www.thotcon.org

- Date: 2011-06-23 22:05:22
    244

    © 2009 atsec information security Taking White Hats to the Laundry: How to Strengthen Testing in Common Criteria Apostol Vassilev, Principal Consultant

    Add to Reading List

    Source URL: atsec.com

    - Date: 2009-10-02 14:17:51
      245

      Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Suryakant Choudhary1, Mustafa Emre Dincturk1, Gregor v. Bochmann1,3, Guy-Vincent Jourdan1,3 1

      Add to Reading List

      Source URL: ssrg.site.uottawa.ca

      - Date: 2013-01-28 16:44:38
        246

        Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin, Gregor v. Bochmann, Guy-Vincent Jourdan School of Information Technology and Engineering University of Ottawa Ottawa, Canada

        Add to Reading List

        Source URL: ssrg.eecs.uottawa.ca

        Language: English - Date: 2013-01-28 16:44:38
          247

          what-is-penetration-testing

          Add to Reading List

          Source URL: www.security-audit.com

          Language: English - Date: 2014-10-17 14:50:35
            248

            Solving Some Modeling Challenges when Testing Rich Internet Applications for Security Suryakant Choudhary1, Mustafa Emre Dincturk1, Gregor v. Bochmann1,3, Guy-Vincent Jourdan1,3 1

            Add to Reading List

            Source URL: ssrg.eecs.uottawa.ca

            Language: English - Date: 2013-01-28 16:44:38
              249

              Some Modeling Challenges when Testing Rich Internet Applications for Security Kamara Benjamin, Gregor v. Bochmann, Guy-Vincent Jourdan School of Information Technology and Engineering University of Ottawa Ottawa, Canada

              Add to Reading List

              Source URL: ssrg.site.uottawa.ca

              Language: English - Date: 2013-01-28 16:44:38
                250

                Ensuring Security through Continuous Testing Jeremy Faircloth Who am I? •

                Add to Reading List

                Source URL: speakerd.s3.amazonaws.com

                Language: English - Date: 2015-05-13 11:58:05
                  UPDATE