Security testing

Results: 3214



#Item
411Computer network security / Metasploit Project / Software testing / FOSDEM / Exploit / Ruby / Perl / Software / Computing / Scripting languages

METASPLOIT FOSDEM 2007 who am i ? H D Moore Metasploit project

Add to Reading List

Source URL: archive.fosdem.org

Language: English - Date: 2012-01-09 13:58:11
412Software testing / Vulnerability / Online shopping / Vendor / Full disclosure / RFPolicy / Computer security / Cyberwarfare / Hacking

Zimperium Zero Day Disclosure Policy Summary The following Zimperium Zero Day Disclosure Policy outlines how Zimperium handles responsible vulnerability disclosure to product vendors, Zimperium customers, and the general

Add to Reading List

Source URL: www.zimperium.com

Language: English - Date: 2015-05-26 05:07:50
413Security / Crime prevention / National security / Software testing / Vulnerability / Implied warranty / Warranty / Oracle Corporation / Computer security / Computing / Contract law / Risk

Security Vulnerability Notice SEORACLE-12 [Security vulnerabilities in Java SE, Issue 61] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

Add to Reading List

Source URL: www.security-explorations.com

Language: English - Date: 2013-06-19 05:31:54
414Computer network security / Software / Cloud clients / Software testing / Malware / Mobile application development / IPhone / Rooting / Proprietary software / Computing / Smartphones / Computer security

Android / iPhone Risks and Solutions Part of the Reverse Engineering and Code Modification Prevention OWASP Project

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-01-29 15:31:05
415Security / Software testing / Crime prevention / National security / Penetration test / Vulnerability / Global Information Assurance Certification / Consensus audit guidelines / Threat / Computer security / Computer network security / Cyberwarfare

DOC Document

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-03-02 09:54:06
416Biometrics / International Committee for Information Technology Standards / ISO/IEC / International Organization for Standardization / Information / Biometric passport / BioAPI / Standards organizations / Security / National security

Committee: (M1.5) - Biometric Performance Testing and Reporting National Designation Title

Add to Reading List

Source URL: www.incits.org

Language: English - Date: 2014-08-05 21:22:52
417Software testing / Computer network security / Hacking / Cross-site scripting / Vulnerability / Cross-site request forgery / SQL injection / Application security / Malware / Cyberwarfare / Computer security / Failure

WhiteHat Website Security Statistic Report Spring 2009, 7th Edition 7th edition There is a difference between what is possible and what is probable, something

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2015-05-20 12:35:42
418Computer network security / Crime prevention / National security / Software testing / Vulnerability / Cyber-physical system / SCADA / Attack / Social vulnerability / Security / Cyberwarfare / Computer security

Security of Cyber-Physical Systems IEEE NTIS 2012 at Boeing Stefano Zanero, PhD Politecnico di Milano, Italy

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2012-09-01 13:46:11
419Hacking / Cyberwarfare / Software testing / Emirates Telecommunications Corporation / Penetration test / Hacker / Network security / Oracle Corporation / Telecommunications Regulatory Authority / Computer network security / Computing / Computer security

HITBSecConf2008 – Dubai Conference Kit Supported & Endorsed by Hack In The Box Security ConferenceDubai

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:53:31
420Crime prevention / National security / Software testing / Integrity / Vulnerability / Database / Ring / Computer security / Security / Cyberwarfare

ABSTRACT KIL, CHONGKYUNG. Mechanisms for Protecting Software Integrity in Networked Systems. (Under the direction of Associate Professor Peng Ning). Protecting software integrity is a key to successfully maintain its own

Add to Reading List

Source URL: repository.lib.ncsu.edu

Language: English - Date: 2010-10-28 07:21:39
UPDATE