Security testing

Results: 3214



#Item
341Economics / Economic history / Mortgage-backed security / Fixed income securities / Structured finance / Fannie Mae / Freddie Mac / Government-sponsored enterprise / Federal Housing Finance Agency / Mortgage industry of the United States / Economy of the United States / Subprime mortgage crisis

The Failure of Supervisory Stress Testing: Fannie Mae, Freddie Mac, and OFHEO

Add to Reading List

Source URL: www.bostonfed.org

Language: English - Date: 2015-04-15 09:16:36
342Relational database management systems / Cross-platform software / Database theory / Denial-of-service attacks / Software testing / Denial-of-service attack / SQL injection / Database security / Exploit / Computing / Data management / Software

Dealing with Database Denial of Service Version 1.0 Released: August 22, 2013

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2013-09-04 10:20:28
343Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Social engineering / Application security / Attack / Computer security / Computer network security / Cyberwarfare

ACROS Security: ACROS Penetration Test, Frequently Asked Questions ACROS Penetration Test A Friendly “Advanced Persistent Threat” Simulation Frequently Asked Questions 1.

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:09
344Standards / Software testing / Computer network security / National security / Professional certification / Software engineering / Software assurance / Penetration test / Software engineer / Security / Computer security / Cyberwarfare

Security Engineering Training A Framework for Corporate Training Programs on the Principles of Secure Software Development April 20, 2009 Editor Stacy Simpson, SAFECode

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:49
345Technology / Crime prevention / National security / Hacking / Software testing / Vulnerability / Computer security / Personal computer / System administrator / Computing / Security / Information technology management

Best Practices Review Summary #02-09a O L AA OFFICE OF THE LEGISLATIVE AUDITOR

Add to Reading List

Source URL: www.auditor.leg.state.mn.us

Language: English - Date: 2002-04-25 14:55:24
346Transportation Security Administration / Access control / Full body scanner / Disability / Airport security / 9 / Security / Transportation in the United States / Aftermath of the September 11 attacks

Security Screening and Traveling with Assistive Technology WebinarRESNA: Security Screening and traveling with Testing captions. RESNA: Security screening and traveling with Assistive Technology: April 2

Add to Reading List

Source URL: resnaprojects.org

Language: English - Date: 2013-04-29 16:51:50
347Mitre Corporation / Failure / Hacking / Software testing / Cross-platform software / Computer security / Cyberwarfare / Common Vulnerabilities and Exposures

A Progress Report on the CVE Initiative Robert Martin / Steven Christey / David Baker The MITRE Corporation

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:56:42
348Computing / Hacking / Software testing / Alert correlation / Attack / Alert messaging / Buffer overflow / Vulnerability / Denial-of-service attack / Cyberwarfare / Computer security / Computer network security

Techniques and Tools for Analyzing Intrusion Alerts PENG NING, YUN CUI, DOUGLAS S. REEVES, and DINGBANG XU North Carolina State University Traditional intrusion detection systems (IDSs) focus on low-level attacks or anom

Add to Reading List

Source URL: discovery.csc.ncsu.edu

Language: English - Date: 2011-11-09 13:26:18
349Cyberwarfare / Auditing / Software testing / Vulnerability / Information security / Fraud deterrence / Security / Data security / Computer security

Internal Business Security Handbook

Add to Reading List

Source URL: www.dsdni.gov.uk

Language: English - Date: 2006-01-06 08:57:53
350Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:01:24
UPDATE