Security testing

Results: 3214



#Item
521Security / Microchip implant / Animal identification / CASPIAN / VeriChip / Cancer / Animal testing / Digital Angel / Radio-frequency identification / Medicine / Health

Synopsis of "Microchip­Induced Tumors in Laboratory Rodents and Dogs:  A Review of the Literature 1990–2006" By Katherine Albrecht, Ed.D. Overview This document summarizes a paper titled "Microc

Add to Reading List

Source URL: www.chipmenot.org

Language: English - Date: 2010-10-15 16:17:43
522Vulnerability / Cyberwarfare / Failure / Computer security / Hacking / Software testing

Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

Add to Reading List

Source URL: www.nlnetlabs.nl

Language: English - Date: 2010-07-25 05:37:06
523Computer network security / Internet protocols / Software testing / Data security / Hacking / Nmap / Port scanner / Nessus / Superscan / Software / Computing / System software

16_05235x ch09.qxp:48 PM

Add to Reading List

Source URL: media.techtarget.com

Language: English - Date: 2007-01-29 15:00:31
524Computing / Software testing / Hacking / Vulnerability / CVSS / Common Vulnerabilities and Exposures / Attack / Metasploit Project / Social vulnerability / Cyberwarfare / Computer security / Computer network security

VULNERABILITIES Do We Need Those Stinking Patches? Of all the risk factors in the InfoSec domain, vulnerabilities are probably the most discussed, tracked, and assessed over the last 20 years. But how well do we really u

Add to Reading List

Source URL: pages.risk.io

Language: English - Date: 2015-04-25 10:45:57
525Software testing / Common Vulnerabilities and Exposures / Vulnerability / Computer security / Cyberwarfare / FireEye /  Inc.

Statement About “Shellshock” Vulnerability: CVE, CVE, CVE, CVE, CVE, and CVE

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-05-01 04:27:39
526Software testing / Common Vulnerabilities and Exposures / Vulnerability / Computer security / Cyberwarfare / FireEye /  Inc.

Statement About “Shellshock” Vulnerability: CVE, CVE, CVE, CVE, CVE, and CVE

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 04:27:39
527Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: korelogic.com

Language: English - Date: 2015-04-27 16:19:21
528Computing / Computer network security / Hacking / Penetration test / Phishing / Metasploit Project / Social engineering / Hacker / Cross-site scripting / Software testing / Computer security / Cyberwarfare

Hack Yourself First A Beginner’s Guide to Penetration Testing   Copyright © 2013 by LCI Technology Group, LLC This work is licensed under the Creative Commons Attribution-NonCommercial-ShareAlike 4.0

Add to Reading List

Source URL: averagesecurityguy.files.wordpress.com

Language: English - Date: 2015-01-07 13:03:36
529Software testing / Hacking / SAINT / Vulnerability / Penetration test / Attack / Zero-day attack / Cracking of wireless networks / Computer security / Cyberwarfare / Computer network security

» GROUP TEST l Vulnerability assessment This month’s group of products enable testing of the infrastructure, and make security assessments easy or, at least, easier, says Peter Stephenson. he environments in which we

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2008-08-18 12:46:26
530Software testing / Hacking / SAINT / Vulnerability / Penetration test / Social vulnerability / Cracking of wireless networks / Nessus / Computer security / Cyberwarfare / Computer network security

» GROUP TEST l Vulnerability assessment Is vulnerability assessment what it should be? Peter Stephenson examines the field and discovers there have been some subtle – and a few not so subtle – evolutions in the spa

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2010-02-03 15:59:42
UPDATE