Security testing

Results: 3214



#Item
351Computer network security / Hacking / Software testing / Vulnerability / Attack / Mitre Corporation / Mitre / Cyberwarfare / Computer security / Clothing

UnforgivableVulns-BH 5.ppt

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:25
352Penetration test / Software testing / Copyright / All rights reserved / Law / Data / Information / Computer network security

Threat Actors and Vectors An Overview of the Current Cyber Bad Guys and Their Methods Warning

Add to Reading List

Source URL: wt4n6.com

Language: English - Date: 2012-12-06 18:22:16
353Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Microsoft Word - unforgivable 3.doc

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-10 12:41:21
354Taxation in the United States / Labour economics / Wage / Daron Acemoğlu / Unemployment / Economics / Labor economics / Social Security

Are starting wages reduced by an insurance premium for preventing wage decline? Testing the prediction of Harris and HolmstromJoop Hartog University of Amsterdam

Add to Reading List

Source URL: www.motu.org.nz

Language: English - Date: 2015-03-22 21:45:55
355Software testing / Security / Hacking / Penetration test / Vulnerability / Hacker / Attack / Network security / HD Moore / Computer network security / Computer security / Cyberwarfare

HACK IN THE BOX SECURITY CONFERENCE 2003 SPONSORSHIP KIT HITBSecConf2003: Overview On the wave of the success of the last HITBSecConf held in 2002, HITB (M) Sdn Bhd

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:44:22
356Hacking / Computing / Software testing / Vulnerability / Threat / Social vulnerability / Windows / Computer security / Cyberwarfare / Computer network security

Measuring Relative Attack Surfaces Michael Howard, Jon Pincus, and Jeannette M. Wing Abstract— We propose a metric for determining whether one version of a system is more secure than another with respect to a fixed set

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2004-03-18 16:33:00
357Water pollution / Water / Environmental science / Water quality / Sampling / Water well / Volatile organic compound / Chemistry / Matter / Environment

Form FM-170 Australian Water Quality Centre BORE WATER TESTING - FOR PRIVATE USE Information Sheet Bore water does not have the same level of security as that provided to households connected to

Add to Reading List

Source URL: www.awqc.com.au

Language: English - Date: 2015-05-24 09:53:42
358Test case / Test / Computer security / Vulnerability / Software testing / Evaluation / Education

Special PublicationSource Code Security Analysis Tool Test Plan Draft 1 for public comment of Version 1.0

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:56
359Cyberwarfare / Software testing / Crime prevention / National security / Penetration test / Application security / Vulnerability / Information security / Code audit / Computer security / Computer network security / Security

U.S. Public Sector HP Vulnerability Assessment Services Increase awareness of growing security threats At-A-Glance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:15
360Videotelephony / Computing / Network architecture / Codenomicon / Session Initiation Protocol / IPv4 / IPv6 / SipX / Oulu University Secure Programming Group / Voice over IP / Software testing / Computer network security

 BLACKHAT BRIEFINGS 2005 The Art of SIP fuzzing and Vulnerabilities Found in VoIP Ejovi Nuwere – Mikko Varpiola

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
UPDATE