Security testing

Results: 3214



#Item
391Cyberwarfare / Computer network security / Cryptography / Hacking / Vulnerability / Parsing / Computer insecurity / SCADA / Penetration test / Software testing / Computer security / Technology

SECURE V2V COMMUNICATION ! A Technique for Secure
 Vehicle-to-Vehicle Communication

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-07-23 20:12:18
392CMAC / HMAC / Key / Authentication / Message authentication codes / Cryptography / Security

Japan Cryptographic Module Validation Program(JCMVP) Specifications of Cryptographic Algorithm Implementation Testing — Message Authentication —

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:16:00
393Hacking / Software testing / Attack surface / Vulnerability / Software quality / SAP AG / Computer security / Computing / Security

Vol 441|4 May 2006|doi:nature04750 LETTERS A regular period for Saturn’s magnetic field that may track its internal rotation G. Giampieri1, M. K. Dougherty2, E. J. Smith1 & C. T. Russell3

Add to Reading List

Source URL: www-ssc.igpp.ucla.edu

Language: English - Date: 2008-04-01 18:53:26
394Hacking / Software testing / Attack surface / Vulnerability / Software quality / SAP AG / Computer security / Computing / Security

Report: Measuring the Attack Surfaces of Enterprise Software Pratyusa K. Manadhata1 , Yuecel Karabulut2 , and Jeannette M. Wing1 1 Carnegie Mellon Univeristy, Pittsburgh, PA, USA

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-11-16 17:07:39
395Cyberwarfare / Hacking / Vulnerability / Social vulnerability / Fuzz testing / Vulnerability management / Software testing / Computer security / Risk

1 Vulnerability finding in Win32 – a comparison There are several well known techniques to find a vulnerability in a closed source product running on the Windows family of operating systems. Researchers tend to prefer

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:40
396Computer network security / Software / SAINT / Penetration test / Security Administrator Tool for Analyzing Networks / System software / Computer security / Software testing

» PRODUCTS l Industry Innovators SAINT AT A GLANCE Vendor: SAINT

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2012-12-14 10:09:12
397Program analysis / Software quality / Fuzz testing / Cyclomatic complexity / Code coverage / Application security / Software security assurance / Black-box testing / Vulnerability / Software testing / Software metrics / Software engineering

Combining McCabe IQ with Fuzz Testing Combining McCabe IQ with Fuzz Testing Introduction

Add to Reading List

Source URL: www.mccabe.com

Language: English - Date: 2008-12-09 09:26:35
398Source code / Software engineering / Software testing / Robert C. Seacord / Coding conventions / Software quality / ISO/IEC JTC1 / Application security / Vulnerability / Computer programming / Computing / Computer security

Microsoft Word - coding-standardv5.doc

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-03-26 12:48:34
399Security / Software quality / Crime prevention / National security / Fuzz testing / Computer security / Penetration test / Software assurance / Agile software development / Software testing / Computer network security / Software development

Reference table from Section 3 of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:17
400Management / Risk management / Actuarial science / Threat model / Risk assessment / Security testing / Information security / Software testing / Threat / Computer security / Risk / Security

Chronic traumatic encephalopathy: the dangers of getting "dinged"

Add to Reading List

Source URL: www.springerplus.com

Language: English
UPDATE