Security testing

Results: 3214



#Item
471Software testing / SAINT / Hacking / Penetration test / Vulnerability / Nessus / Computer appliance / Computer security / Computer network security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2012-02-08 12:34:15
472Hacking / Software testing / Computer network security / Vulnerability / Microsoft Windows / SAINT / CVSS / Windows / Internet Explorer / Computing / Cyberwarfare / Computer security

PDF Document

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2011-11-14 10:21:50
473Computing / Software testing / Evaluation / Cyberwarfare / Application security / Penetration test / Quality assurance / Software development process / Software quality / Computer network security / Computer security / Security

El Al Synopsis El Al, Israel’s national airline, selected Seeker as their application security testing solution to be part of existing software quality assurance processes. Seeker is routinely used by El Al for testing

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:52
474Application security / Penetration test / Information security / Public safety / Cyberwarfare / Computer security / Security / ECI Telecom

ECI Telecom Synopsis ECI Telecom, a global telecommunication solutions provider, has chosen Seeker for application security testing throughout the software development lifecycle. Seeker has been chosen over other applica

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-01-24 05:55:18
475Cyberwarfare / Software quality / Fuzz testing / Hacking / Vulnerability / Buffer overflow / Uncontrolled format string / Computer network security / Software testing / Computer security / Software bugs

Software Vulnerability • Refers to a weakness in a system allowing an attacker to violate the integrity, confidentiality, access control, availability, consistency or audit mechanism of the system or the data and appl

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:36
476Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: www.korelogic.com

Language: English
477Computer network security / Software testing / Hacking / Cross-platform software / Application security / Vulnerability / Penetration test / Qualys / OWASP / Software / Computing / Computer security

At Raytheon Canada Limited, we are committed to both our customers and employees. Our division provides Mission Support, servicing the defence, security and aerospace sectors with a broad range of high technology product

Add to Reading List

Source URL: www.raytheon.ca

Language: English - Date: 2015-03-25 09:21:44
478DNA profiling / Molecular biology / Sheriffs in the United States / Government / Security / Expungement / Biology / Biometrics / DNA

ArtApplication for DNA testing, LA C.Cr.P. ArtWest’s Louisiana Statutes Annotated Louisiana Code of Criminal Procedure (Refs & Annos) Title XXXI-A. Post Conviction Relief (Refs & Annos) LSA-C.Cr.P. Ar

Add to Reading List

Source URL: www.innocenceproject.org

Language: English - Date: 2015-03-26 15:21:11
479FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Validation Program / Cryptographic Module Testing Laboratory / Cryptography / Cryptography standards / Computer security

FIPSValidation Certificate No. 1010

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 22:02:12
480FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Key Wrap / National Voluntary Laboratory Accreditation Program / Cryptographic Module Testing Laboratory / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Computer security

FIPSValidation Certificate No. 1012

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 22:00:42
UPDATE