Security testing

Results: 3214



#Item
371Software testing / Security / Hacking / Vulnerability / Application security / Penetration test / Cross-site scripting / Software bug / Software security assurance / Cyberwarfare / Computer security / Computer network security

ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions ACROS Application Security Analysis Frequently Asked Questions 1. What is the ACROS Application Security Analysis?

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:08
372Software engineering / Quality assurance / Software assurance / Software testing / Vulnerability / Software bug / DHS Directorate for Science and Technology / Computer security / Application security / Software quality / Security / Computing

The Vision Software Assurance Marketplace A Transformative Force in the Software Ecosystem www.ContinuousAssurance.org

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-10-28 17:01:42
373Computer security / Software testing / Hacking / Swarm behaviour / Zoology / Vulnerability / CVSS / Canvas / MongoDB / Cyberwarfare / Data management / Computer network security

L A RG E-S C A L E R ECO N N A ISSA N C E A N D E X PLO ITATI O N Immunity’s SWARM SPEED + INTELLIGENCE Overview

Add to Reading List

Source URL: www.immunitysec.com

Language: English - Date: 2012-07-27 12:16:27
374Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:59:36
375Computing / Software testing / National security / Application security / Core Security Technologies / Vulnerability / OWASP / Voice over IP / Web application security / Computer network security / Security / Computer security

Conference Kit Version 2.0 * Over 30 Network Security Specialists and Researchers * 7-tracks of Hands on Technical Training Sessions * Network Assessment and Latest Attack Methods

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:50:30
376Software testing / Computer network security / Crime prevention / National security / Application security / Threat model / Penetration test / Information security / Vulnerability / Computer security / Security / Cyberwarfare

Cigital SDL Case Study Outline – Insurance Vertical Cigital, IncRidgetop Circle Suite 400 Dulles, VA

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2013-11-26 20:44:24
377Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
378Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-18 15:05:43
379Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-11 05:58:33
380Hacking / Software bugs / Computer network security / Software testing / Vulnerability / Buffer overflow / SQL injection / Stack buffer overflow / Cross-site scripting / Computing / Cyberwarfare / Computer security

Software Bugs: Distribution, Exploitation and the Future Felix ‘FX’ Lindner, Recurity Labs GmbH, Introduction Significant research efforts were undertaken in the last years to detect and prevent

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2009-06-15 11:36:06
UPDATE