Security testing

Results: 3214



#Item
401Computer security / Cyberwarfare / Computer network security / Software testing / Password / Information security / Vulnerability / Fred Cohen / Security / Crime prevention / National security

Information at all.nethttp://all.net/

Add to Reading List

Source URL: all.net

Language: English - Date: 2013-07-10 14:08:43
402Software quality / Hacking / Software testing / Vulnerability / C / Proprietary software / Software assurance / Requirement / Debian build toolchain / Computing / Software development / Software engineering

Reference tables from Section 2b of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:16
403Cryptographic Module Testing Laboratory / FIPS 140-2 / Cryptographic Module Validation Program / Public key certificate / Ethics / National Accreditation Board for Testing and Calibration Laboratories / Cryptography standards / Evaluation / Computer security

<4D6963726F736F667420576F7264202D2043424D2D3031422088C38D86838283578385815B838B8E8E8CB18B408AD68FB394468BC696B18EE688B58EE88F872E646F63>

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-05-28 08:15:44
404Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:59:36
405Hacking / Computer network security / Mitre Corporation / Software testing / Common Vulnerabilities and Exposures / Vulnerability / White hat / Hacker / Social vulnerability / Computer security / Cyberwarfare / Security

The Vulnerabilities of Developing on the NET Robert A. Martin April 2001 Published in

Add to Reading List

Source URL: cve.mitre.org

Language: English - Date: 2007-09-17 13:52:21
406Computer security / Computer file formats / Software testing / Zero-day attack / Vulnerability / Buffer overflow / Uncontrolled format string / String / File format / Computing / Cyberwarfare / Computer network security

The Art of File Format Fuzzing In September 2004, much hype was made of a buffer overflow vulnerability that existed in the Microsoft engine responsible for processing JPEG files. While the resulting vulnerability itself

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
407Ethics / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level / Security Target / Validation / Evaluation / Computer security / Thought

Trust Technology Assessment Program Common Criteria Certificate

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
408Computer network security / Failure / Zero-day attack / Buffer overflow / Vulnerability / Cyberwarfare / Computer security / Software testing

0002b510h: 0002b520h: 0002b530h: 0002b540h: 0002b550h: 0002b560h:

Add to Reading List

Source URL: www.blackhat.com

Language: English
409Debugging / Computer security / Software development process / OpenOffice.org / Software / Software testing / Software bug

A Systematic Study of Automated Program Repair: Fixing 55 out of 105 bugs for $8 Each Claire Le Goues Michael Dewey-Vogt Computer Science Department University of Virginia

Add to Reading List

Source URL: www.genetic-programming.org

Language: English - Date: 2012-06-28 00:31:08
410Risk / Software testing / Computer network security / Hacking / Nessus / Vulnerability scanner / OpenVAS / Vulnerability / Tenable Network Security / Computer security / Cyberwarfare / Computing

Microsoft Word - Nessus_vs_OpenVAS_en_v102

Add to Reading List

Source URL: security.lss.hr

Language: English - Date: 2015-01-21 07:50:04
UPDATE