Security testing

Results: 3214



#Item
261Security / Counter-terrorism / Customs Trade Partnership against Terrorism / Software testing / Risk assessment / Vulnerability / Validation / Management / Supply chain management / Risk

C-TPAT Validation/Revalidation Results September 2014 Wayne Kornmann – Director, Los Angeles C-TPAT Field Office Bryant Van Buskirk – Supervisor, Los Angeles C-TPAT Office

Add to Reading List

Source URL: www.cosco-usa.com

Language: English - Date: 2014-09-09 14:56:15
262Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Microsoft Word - vuln2010q3-e.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-05-28 22:03:35
263Computer network security / Software testing / Hacking / Vulnerability / CVSS / Cross-site scripting / Cross-site request forgery / Code injection / SQL injection / Cyberwarfare / Computer security / Computing

Web Application Scan Document Revision Initial Report Prepared By: AppCheck-NG

Add to Reading List

Source URL: appcheck-ng.com

Language: English - Date: 2014-09-08 05:22:28
264Protection Profile / Security Target / United Kingdom Accreditation Service / Cryptographic Module Testing Laboratory / Security-evaluated operating system / Evaluation / Computer security / Common Criteria

Steven J. Murdoch University of Cambridge Computer Laboratory 15 JJ Thomson Avenue Cambridge CB3 0FD

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-25 06:54:24
265Software testing / Security / Hacking / Vulnerability / Attack / Password / Security risk / Social engineering / RSA / Computer network security / Cyberwarfare / Computer security

TRESPASS: Plug-and-Play Attacker Profiles for Security Risk Analysis Wolter Pieters∗† , Dina Hadˇziosmanovi´c∗ , Aleksandr Lenin‡ , Lorena Montoya† , and Jan Willemson‡ ∗ Delft University of Technology,

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-05-07 16:20:44
266Hacking / Software testing / Threat / Abuse / Vulnerability / Attack tree / Insider / Motivation / Computer network security / Cyberwarfare / Computer security

2014 IEEE Security and Privacy Workshops Understanding Insider Threat: A Framework for Characterising Attacks Jason R.C. Nurse† , Oliver Buckley† , Philip A. Legg† , Michael Goldsmith† , Sadie Creese† , Gordon

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:10:27
267Penetration test / Software testing / Surveillance / National Security Agency / Global Information Assurance Certification / Integrator / Software development process / Computer security / Computing / Computer network security

Criteria for CSfC Integrators 5 May 2014

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2014-09-12 11:51:25
268Security / Software testing / Hacking / Vulnerability / Software quality / Zero-day attack / Software assurance / Software bug / Patch / Computer network security / Cyberwarfare / Computer security

문서의 제목 나눔고딕B, 54pt

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-09-12 12:11:16
269Standardized tests / Psychometrics / CTB/McGraw-Hill / Test / McGraw-Hill / Educational Testing Service / ACT / E-assessment / Education / Evaluation / Educational psychology

Test Security Conf Background_1

Add to Reading List

Source URL: www.caveon.com

Language: English - Date: 2014-09-18 16:35:26
270Computer security / Hardware Trojan / Field-programmable gate array / Physical Unclonable Function / Cyberwarfare / Security / Fault injection / Software testing

www.cost.eu/ict COST Action no. IC1204 2012⏐2016

Add to Reading List

Source URL: w3.cost.eu

Language: English - Date: 2013-05-30 08:33:11
UPDATE