Security testing

Results: 3214



#Item
531Security / Computer security / Hacking / Software testing / Vulnerability / Proprietary software / Open source / Ex parte Endo / Free software / Software licenses / Computer law / Law

December 4, 2014 Mr. Jhonny Pineda contributed to organizing numerous community events in my district office such as grant workshops, community resource fairs, small business export forums, veteran town hall meetings, S

Add to Reading List

Source URL: www.gpo.gov

Language: English - Date: 2015-05-04 13:26:16
532Cyberwarfare / Software engineering / Vulnerability / Software development process / Science / IT risk management / Software testing / Computer security / Hacking

Sonatype Component Lifecycle Management KEY CAPABILITIES Build an effective secure software development lifecycle and avoid using vulnerable components from the start. CONTINUOUSLY AUTOMATE

Add to Reading List

Source URL: www.sonatype.com

Language: English
533Software engineering / Neotys / Load testing / Reliability engineering / Quality assurance / Cloud testing / System testing / Software testing / Evaluation / Software quality

Neotys Selected to SD Times 100: Elements of Success Award Company Chosen as Leader in Mobile Testing, Quality Assurance and Security Category Waltham, Mass. – June 9, 2014 – Neotys, a leader in easy-to-use, load tes

Add to Reading List

Source URL: www.neotys.com

Language: English - Date: 2014-06-30 05:16:43
534Cyberwarfare / FireEye /  Inc. / Computer network security / Software testing / Social vulnerability / Cross-site request forgery / Vulnerability / Computer security / Risk / Security

Support Notice FireEye Notice: Disclosed Vulnerabilities July 9, 2014 On July 7, 2014, FireEye responded to a public disclosure of some suspected security issues in the FireEye AX product line by a researcher, Jean-Mari

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 16:32:18
535Cyberwarfare / FireEye /  Inc. / Computer network security / Software testing / Social vulnerability / Cross-site request forgery / Vulnerability / Computer security / Risk / Security

Support Notice FireEye Notice: Disclosed Vulnerabilities July 9, 2014 On July 7, 2014, FireEye responded to a public disclosure of some suspected security issues in the FireEye AX product line by a researcher, Jean-Mari

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 16:32:18
536Thermography / Law / Government / National security / Building inspection / Home inspection / Real estate / Inspector

Qualify Your inspector The state of California requires ZERO certifications, licenses or testing to be a home inspector Your Inspector Must Be A General Contractor California has NO requirements for individuals acting as

Add to Reading List

Source URL: mazzainspections.com

Language: English - Date: 2014-05-06 12:20:49
537Nessus / Software / Tenable Network Security / Lumeta Corporation / Vulnerability scanner / Port scanner / Network security / Computer security / System software / Computer network security

NETWORK TESTING LABS REVIEW Network Situational Awareness Lumeta’s Enterprise Situational Intelligence (ESI) tells you who’s using your network, it identifies rogue or stealthy devices and ESI detects unintended lea

Add to Reading List

Source URL: www.lumeta.com

Language: English - Date: 2015-03-30 15:16:08
538Smartphones / Hacking / Software testing / Vulnerability / Cisco IOS / Patch / Computer architecture / IOS / Social vulnerability / Risk / Computer security / Computing

SESSION ID: MBS-T09 Mobile Vulnerabilities From Data Breach to Complete Shutdown

Add to Reading List

Source URL: www.rsaconference.com

Language: English - Date: 2015-04-21 13:46:51
539Managed security service / Computing / Computer forensics / Computer network security / FireEye /  Inc.

Testing CMS-1324 — "IDC" Branded & Special Characters

Add to Reading List

Source URL: www.fireeye.kr

Language: English - Date: 2015-04-30 19:09:31
540Computer network security / Software testing / Computing / Hacking / NetBIOS / Vulnerability / Denial-of-service attack / SAINT / Computer security / Cyberwarfare / Network protocols

SAINTwriter Assessment Report

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2010-03-30 10:53:40
UPDATE