Security testing

Results: 3214



#Item
301Computer security / Electronic commerce / Application firewall / DMZ / Software testing / DevOps / Cloud computing / Application security / Web application security / Computer network security / Computing / Cyberwarfare

Guarding Your Web Systems CLOUD-DMZ ™ Web APPLICATION Security A NEW, CLOUD-BASED ARCHITECTURE

Add to Reading List

Source URL: www.sentrix.com

Language: English - Date: 2015-05-19 11:36:28
302Portable software / Operations security / Opera / Software / Password / Espionage

Getting Started: Cadet Online Testing Step by Step Before You Start Gather the following information: 1. Your CAPID Number (six digit number found on your membership id card) 2. Last 4 digits of your social security numb

Add to Reading List

Source URL: capmembers.com

Language: English - Date: 2012-02-14 09:12:55
303Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:14
304Knowledge / Computer security / Psychometrics / Sports science / Test / Standardized test / Psychological testing / Penetration test / SecurityMetrics / Education / Evaluation / Educational psychology

The Security of Tests, Examinations, and Other Assessments | Final Version | v.1.0 INTERNATIONAL TEST COMMISSION The ITC Guidelines on the Security of Tests, Examinations, and Other Assessments

Add to Reading List

Source URL: www.intestcom.org

Language: English - Date: 2015-01-30 17:53:29
305Specification / Technology / Management / Business / ONVIF / Surveillance / Video

Request for Quotation (RfQ) For ONVIF Technical Services Committee Maintenance Working Group Profile Q Working Group Security Testing Working Group &

Add to Reading List

Source URL: www.onvif.org

Language: English - Date: 2015-02-18 14:26:53
306Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:16
307Software licenses / Computing / Computer law / Software testing / Software quality / Open-source software / Proprietary software / Vulnerability / Software development process / Computer security / Computer network security / Cyberwarfare

Talk delivered at IFIP WCC 2004, Toulouse, France Trusting Strangers: Open Source Software and Security Carl E. Landwehr Institute for Systems Research University of Maryland, College Park Abstract:

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2012-01-27 15:46:38
308Computer network security / Software testing / Application firewall / OWASP / Vulnerability / Application security / Copyright law of the United States / Copyright / Computer security / Cyberwarfare / Security

The Self Healing Cloud Protecting Applications and Infrastructure with Automated Virtual Patching Dan Cornell CTO, Denim Group @danielcornell

Add to Reading List

Source URL: 2011.appsecusa.org

Language: English - Date: 2011-10-02 13:43:52
309Microsoft certification / Vulnerability / Cyberwarfare / Computing / Software testing / Computer security / Microsoft Certified Professional

AFINA SISTEMAS INFORMÁTICOS, S.A. R2/PC08-SER, Rev.: 1 F5-311 F5 BIG-IP Application Security Manager

Add to Reading List

Source URL: es.westcon.com

Language: English
310Software testing / Computer network security / Cross-site scripting / Cross-site request forgery / Plug-in / Application security / Penetration test / Vulnerability / SQL injection / Cyberwarfare / Computer security / Computing

Prevoty Plug-ins: Application Security for Legacy Applications The frequency and impact of hacking attempts against websites and applications continue to rise to unprecedented levels, creating significant challenges for

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:13
UPDATE