Security testing

Results: 3214



#Item
271Cloud computing / Computer network security / Google Chrome / Software testing / National security / Criticism of Google / Google / Vulnerability / Internet privacy / Software / Computing / Computer security

Google for Work Security and Compliance Whitepaper How Google protects your data. for Work

Add to Reading List

Source URL: static.googleusercontent.com

Language: English - Date: 2015-04-02 15:33:25
272Computing / Copyright law / Software testing / Cross-platform software / Software bug / Software release life cycle / Vulnerability / Debian / Linux kernel / Software / Software licenses / Computer security

Security in Open versus Closed Systems – The Dance of Boltzmann, Coase and Moore Ross Anderson Cambridge University, England; email Abstract. Some members of the open-source and free software commun

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-07-25 10:25:30
273Hacking / Software testing / Vulnerability / Java / Google App Engine / Implied warranty / Security / Warranty / Computing / Contract law / Computer security

Security Vulnerability Notice SEGOOGLE-6 [Google App Engine Java security sandbox bypasses, Issue 41] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

Add to Reading List

Source URL: www.security-explorations.com

Language: English - Date: 2015-05-15 02:13:23
274Graphics file formats / Software testing / Computer security / Pwnie Awards / Computer network security / Cross-platform software / Adobe Acrobat / Vulnerability / Portable Document Format / Software / Computing / Cyberwarfare

Fructuoso Rivera ’A’ ´ X5000BOG - Cordoba Argentina T

Add to Reading List

Source URL: www.binamuse.com

Language: English
275Crime prevention / Surveillance / Closed-circuit television / China Central Television / Physical security / Statistical hypothesis testing / Digital camera / Security / National security / Public safety

Kinematic Analysis of a Space Mechanism—Rendezvous Simulator

Add to Reading List

Source URL: www.abhinavjournal.com

Language: English - Date: 2013-12-17 06:08:52
276Software testing / Computer network security / Crime prevention / Electronic commerce / National security / Vulnerability / Dependability / Software architecture / Ring / Computing / Security / Computer security

Dependability Research Group Jack Davidson Professor

Add to Reading List

Source URL: www.seas.virginia.edu

Language: English - Date: 2013-07-22 09:14:44
277Computer security / Evaluation / Software bugs / Common Criteria / Reliability engineering / Bug tracking system / Vulnerability / Software development process / Usability / Software testing / Software development / Software quality

Chapter 23: System Evaluation and Assurance C H A P TE R 23 System Evaluation and

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2006-08-25 10:25:28
278Computing / Computer network security / Hacking / Software testing / Penetration test / Certified Information Security Manager / Information security / Certified Ethical Hacker / Security controls / Computer security / Security / Data security

TECHNICAL SECURITY ASSESSMENTS SOUTHERN CROSS SPECIALISTS Real World Concerns

Add to Reading List

Source URL: www.sccs.com.au

Language: English - Date: 2014-03-10 05:22:21
279Vulnerability / Psychological resilience / Understanding / Cyberwarfare / Failure / Software testing / Computer security / Hacking

The Hayward Shoreline Resilience Study is building on the outcomes of ART Adapting to Rising Tides project subregional project and refining vulnerabilities, risks, and adaptation actions for sea www.adaptingtorisingtides

Add to Reading List

Source URL: www.adaptingtorisingtides.org

Language: English - Date: 2014-08-07 14:12:28
280Computer network security / Software testing / Crime prevention / National security / Vulnerability / Counterintelligence / Threat model / Information security / Penetration test / Computer security / Security / Cyberwarfare

Magdeburger Journal zur Sicherheitsforschung Gegründet 2011 | ISSN: Herausgegeben von Stefan Schumacher und Jörg Sambleben Erschienen im Magdeburger Institut für Sicherheitsforschung This article appears in

Add to Reading List

Source URL: www.sicherheitsforschung-magdeburg.de

Language: English - Date: 2014-10-09 09:28:35
UPDATE