Security testing

Results: 3214



#Item
291Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:16
292Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:14
293Software development / STAR / Exploratory testing / Test automation / Application security / Model-based testing / Unit testing / Vulnerability / Software testing / Software quality / Evaluation

EXTRA PROGRAM SUNDAY MAY 17TH - BONUS SESSIONS 11:00-16:30 13:00-18:00 16:00-18:00 * Program subject to change

Add to Reading List

Source URL: btdconf.com

Language: English - Date: 2015-04-19 16:09:36
294Software licenses / Computing / Computer law / Software testing / Software quality / Open-source software / Proprietary software / Vulnerability / Software development process / Computer security / Computer network security / Cyberwarfare

Talk delivered at IFIP WCC 2004, Toulouse, France Trusting Strangers: Open Source Software and Security Carl E. Landwehr Institute for Systems Research University of Maryland, College Park Abstract:

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:01:35
295Cyberwarfare / Pension Benefit Guaranty Corporation / Vulnerability / Penetration test / Pension / Financial economics / Charles E.F. Millard / Software testing / Computer security / Inspector General

Pen nsion Benefit B Guaran G nty Corrporatio

Add to Reading List

Source URL: oig.pbgc.gov

Language: English - Date: 2015-04-02 11:44:39
296Internal Revenue Service / Money / IRS tax forms / Payment / Social Security / Accounts payable / Government / Income tax in the United States / Taxation in the United States / Economics / Business

Procedure 23715c: Selecting and Paying Human Subject Participants Research project results are often dependent on utilization of human subjects for testing, tasting, reacting, dieting, exercising, responding to various s

Add to Reading List

Source URL: www.co.vt.edu

Language: English - Date: 2014-01-24 15:28:11
297Computing / Software testing / Hacking / Vulnerability / Full disclosure / CVSS / Responsible disclosure / Symantec / Patch / Computer security / Cyberwarfare / Computer network security

Responsible Vulnerability Disclosure Zoltán Précsényi Sr Manager Government Affairs EMEA Agenda 1

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:32:13
298Computing / Software testing / Hacking / Software bugs / Vulnerability / Penetration test / Trojan horse / Flaw hypothesis methodology / JavaScript / Cyberwarfare / Computer network security / Computer security

A Taxonomy CARL of Computer E. LANDWEHR,

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-18 19:00:37
299Technology / Electrical engineering / Laboratory equipment / Network analyzer / Electronic test equipment / Radio electronics / Electromagnetism

Why PC-Driven? A PC-driven VNA is the next generation of advanced RF testing. Performance, portability, security and price make these analyzers ideal for many RF and microwave applications. Our PC-driven VNAs separate t

Add to Reading List

Source URL: www.coppermountaintech.com

Language: English - Date: 2014-02-06 09:46:34
300Hacking / Vulnerability / Computing / Responsible disclosure / Full disclosure / Radio-frequency identification / Computer security / Cyberwarfare / Software testing

ENISA National Cyber Security Strategies workshop Responsible Disclosure May 13, 2015 RIGA LATVIA Varis Teivans

Add to Reading List

Source URL: resilience.enisa.europa.eu

Language: English - Date: 2015-05-18 07:31:30
UPDATE