Security testing

Results: 3214



#Item
481Security / Software testing / Crime prevention / National security / Vulnerability / Threat / Open source software security / Cyber-security regulation / Computer security / Computer network security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:16
482FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / Cryptographic Module Testing Laboratory / Cryptographic Module Validation Program / Cryptography / Cryptography standards / Computer security

FIPSValidation Certificate No. 1002

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 22:09:31
483Computer network security / Software testing / OWASP / National security / Vulnerability / Application security / Web application security / Computer security / Cyberwarfare / Security

Bilal Soylu - Application Security 1 PRACTICAL APPLICATION SECURITY

Add to Reading List

Source URL: www.boncode.net

Language: English - Date: 2012-10-18 13:45:45
484Climate change / Vulnerability / Software testing / Economics of global warming / Environment / Computer security / Risk / Environmental economics / Social vulnerability

PIK Report No. 127 UNDERSTANDING CHANGE IN PATTERNS OF VULNERABILITY

Add to Reading List

Source URL: www.pik-potsdam.de

Language: English - Date: 2014-02-04 04:05:47
485Vulnerability / Cyberwarfare / Failure / Computer security / Hacking / Software testing

Microsoft Word - Newsflash announcement5.docx

Add to Reading List

Source URL: inclusivegrowth.be

Language: English - Date: 2013-12-20 03:02:13
486Software testing / Computer network security / Web development software / Electronic commerce / ColdFusion / Penetration test / Cross-site scripting / Vulnerability / Adobe Systems / Computing / Computer security / Cyberwarfare

PDF Document

Add to Reading List

Source URL: wwwimages.adobe.com

Language: English - Date: 2015-05-20 19:59:52
487Hacking / Crime prevention / National security / Software testing / Vulnerability / Configuration management / Security management / Malware / North American Electric Reliability Corporation / Computer security / Security / Cyberwarfare

CyberSoft VSTK-P Configuration for NERC STANDARD CIPMAY 2, 2006 Standards The North American Electric Reliability Corporation (NERC) is a federally sanctioned organization that sets and enforces standards for bulk

Add to Reading List

Source URL: www.cyber.com

Language: English - Date: 2013-08-13 11:07:11
488Computer network security / Software testing / Hacking / Electronic commerce / Application security / Cross-site scripting / Vulnerability / Malware / OWASP / Computer security / Software / Cyberwarfare

PDF Document

Add to Reading List

Source URL: cdn.cupinteractive.com

Language: English - Date: 2014-08-07 09:04:47
489Technology / Medicine / Security / Software testing / Computer network security / Codenomicon

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-05-12 21:22:18
490Software testing / Computer network security / Hacking / Vulnerability / Cross-site scripting / Malware / SQL injection / Exploit / World Wide Web / Computer security / Cyberwarfare / Computing

A Cloud Security Primer Web Application Vulnerabilities

Add to Reading List

Source URL: www.trendmicro.com

Language: English - Date: 2012-09-26 19:56:09
UPDATE