Security testing

Results: 3214



#Item
381Computer network security / Software testing / Hacking / National security / Vulnerability / Attack / Full disclosure / Computer virus / Application security / Computer security / Cyberwarfare / Security

54 Best Practices in Computer Network Defense: Incident Detection and Response M.E. Hathaway (Ed.) IOS Press, 2014 © 2014 The authors and IOS Press. All rights reserved.

Add to Reading List

Source URL: www.recurity-labs.com

Language: English - Date: 2014-02-19 10:42:29
382Computing / Vulnerability / Fuzz testing / Coverity / Cross-site scripting / Test automation / Code injection / C / Software testing / Computer security / Cyberwarfare

Reference table from Section 2a of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:15
383Evaluation / Science / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Validation / Cryptography / Verification and validation / Cryptographic hash function / FIPS 140-3 / Cryptography standards / Computer security / FIPS 140-2

<4D6963726F736F667420576F7264202D204A434D2D30312088C38D86838283578385815B838B8E8E8CB18B7982D194468FD890A7937882CC8AEE967B8B4B92F62E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:10
384Risk / Computer network security / Software testing / Cross-site scripting / Vulnerability / Application security / SQL injection / Social vulnerability / Cyberwarfare / Computer security / Security

WhiteHat Website Security Statistic Report Fall 2009, 8th Edition 8th edition Introduction

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2015-05-26 18:12:11
385Cyberwarfare / Computer network security / Crime prevention / National security / Penetration test / Vulnerability / Application firewall / Information security / Quality assurance / Computer security / Security / Software testing

ambersail_application_penetration_testing

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
386Computer security / Software testing / Computer network security / Security engineering / Software security assurance / Vulnerability / Application security / Software assurance / Static program analysis / Software quality / Cyberwarfare / Security

Draft Special PublicationSource Code Security Analysis Tool Functional Specification Version 1.0 Information Technology Laboratory (ITL), Software

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2013-05-07 16:54:57
387Cyberwarfare / Hacking / Vulnerability / Malware / Social vulnerability / Software bug / Twitter / Exploit / Software testing / World Wide Web / Computer security

Washington DC – FebA 0-day’s life “Offense as Defense” Panel Discussion – Offensive Markets for Vulnerability Research – Pros and Cons

Add to Reading List

Source URL: revuln.com

Language: English - Date: 2013-04-04 19:34:02
388Software testing / Hacking / Black Hat Briefings / David Litchfield / Vulnerability / Application security / SecurityFocus / Hacker / Security / Computer security / Computing / Cyberwarfare

Visit us at: www.microsoft.com/security security portal SecurityFocus is the leading provider of security intelligence services for business, and a trusted information resource for the security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:14
389Computer security / Computer network security / Information technology audit / Black Hat Briefings / Code audit / Vulnerability / Computer virus / Application security / Security / Cyberwarfare / Software testing

Owning Anti-Virus: Weaknesses in a Critical Security Component AV software is becoming extremely popular because of the its percieved protection. Even the average person is aware they want AV on their computer (see AOL,

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:41
390Cyberwarfare / Software testing / Hacking / Vulnerability / Social vulnerability / Hazard / CVSS / Critical infrastructure protection / Security / Risk / Computer security

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES Terrorism Threat Vulnerability Self Assessment Tool Dear Industry Partner, The Terrorism Threat Vulnerability Self Assessment tool is a guide to help you bette

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
UPDATE