Security testing

Results: 3214



#Item
281Software testing / System software / Hacking / Secure Shell / Vulnerability / Nessus / Password / Penetration test / Malware / Computer security / Computer network security / Cyberwarfare

Appendix A Air Force Institute of Technology Penetration Test of Simulated Election Test Report

Add to Reading List

Source URL: www.fvap.gov

Language: English - Date: 2015-04-24 11:32:24
282Euphoriants / Stimulants / Chemistry / Drug control law / Drug test / Employment / United States Coast Guard / Cocaine / Amphetamine / Medicine / Pharmacology / Anorectics

DEPARTMENT OF HOMELAND SECURITY U.S. COAST GUARD DOT/USCG Periodic Drug Testing Form

Add to Reading List

Source URL: www.nemaritime.com

Language: English - Date: 2010-08-07 11:01:05
283Software licenses / Computer law / Computer network security / Software testing / Open-source software / Debian / Vulnerability / Open source / Continuous integration / Software / Security / Computer security

Real World Experience: Media & Entertainment Customer Results  

Add to Reading List

Source URL: www.sonatype.com

Language: English
284Politics / Government / Tests / Computer network security / Penetration test / Electronic voting / Help America Vote Act / Federal Voting Assistance Program / Election Assistance Commission / Election technology / Software testing / Evaluation

FVAP Statement on Research Reports Related to UOCAVA System Testing Scope and Purpose In 2010, the Federal Voting Assistance Program (FVAP) sponsored research on the Uniformed and Overseas Citizens Absentee Voting Act (U

Add to Reading List

Source URL: www.fvap.gov

Language: English - Date: 2015-04-24 11:04:17
285Computer network security / Software testing / Crime prevention / National security / Vulnerability / Information security / Penetration test / Countermeasure / Social vulnerability / Security / Computer security / Cyberwarfare

Basic Training Editors: Richard Ford, Deborah Frincke, Ethics in Security Vulnerability Research

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
286Software testing / Computing / Cryptographic software / Secure Shell / Hacking / Penetration test / Vulnerability / OpenSSH / Application security / Computer security / Computer network security / Cyberwarfare

Appendix B FEDERAL VOTING ASSISTANCE PROGRAM VOTING PENETRATION TEST CONTRACT NUMBER: HHS CASU WII-0037-CALIBRE August 15, 2011

Add to Reading List

Source URL: www.fvap.gov

Language: English - Date: 2015-04-24 11:32:57
287Thiosulfates / Antidotes / Sodium thiosulfate / Security / Screw cap / Tamper-evident / Closure / Litre / Screw / Technology / Packaging / Sodium compounds

Gosselin Water Testing Selection Guide Water control for safe water Quality products for reliable results Sa

Add to Reading List

Source URL: www.gosselin-america.com

Language: English - Date: 2014-05-15 12:24:38
288Security / Computer security / Critical Software / Computing / Software / Computer network security / Software testing / Codenomicon

Creating Trust with Coriant Power suppliers, critical infrastructure providers, and network builders all operate in an unsafe world, where cyber attacks and network malfunctions can disrupt services. Coriant’s customer

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-06-08 10:21:12
289Applied genetics / Security / DNA / Law enforcement in the United Kingdom / DNA profiling / Amelogenin / STR multiplex systems / Second Generation Multiplex Plus / Biometrics / Biology / Genetics

Collaborative Testing Services, Inc FORENSIC TESTING PROGRAM DNA - Mixture Test NoSummary Report This proficiency test was sent to 153 participants. Each participant received a sample pack consisting of two

Add to Reading List

Source URL: www.ctsforensics.com

Language: English - Date: 2015-05-07 10:31:29
290Terminology / Center for Domestic Preparedness / Energetic Materials Research and Testing Center / Proto-Oceanic language / Public safety / Management / United States Department of Homeland Security / Emergency management / Point of contact

Local jurisdictions and/or local first response agencies must use this form to request mobile training provided from the below listed training partners if the requested course is to be held within the state of Tennessee.

Add to Reading List

Source URL: www.tnema.org

Language: English - Date: 2015-05-07 09:51:38
UPDATE