Security testing

Results: 3214



#Item
551McLean /  Virginia / Cyberwarfare / Vulnerability / Security / Data security / Software testing / Computer security / Central Intelligence Agency

UNCLASSIFIED Page 13 UNCLASSIFIED UNCLASSIFIED Page 13

Add to Reading List

Source URL: www.justice.gov.uk

Language: English - Date: 2014-05-22 13:26:05
552Human development / Software testing / Data security / Vulnerability / Information security / Attachment theory / Threat / United States Agency for International Development / Computer security / Cyberwarfare / Security

Sensitive But Unclassified FINAL REPORT

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2007-09-19 01:00:00
553Software testing / Cyberwarfare / Crime prevention / National security / Penetration test / Application security / Vulnerability / Security testing / Information security / Computer security / Security / Computer network security

In Brief Penetration Testing Attack is the best form of defence In an ideal world, business applications, IT, mobile and Wi-Fi infrastructures would

Add to Reading List

Source URL: secode.com

Language: English - Date: 2015-01-30 04:53:54
554Retirement / Unemployment / Welfare / Centrelink / Disability pension / Job Services Australia / Work for the Dole / Social security / Australia / Socioeconomics

Work Testing Submission-July 2010

Add to Reading List

Source URL: www.goodshepvic.org.au

Language: English - Date: 2011-05-16 03:14:46
555Cyberwarfare / Computer network security / Electronic commerce / National security / Vulnerability / Application security / Security testing / Computer security / Software testing / Security

Seeker – Best Quality Application Security www.quotium.com 1/6

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-09-06 18:09:09
556Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-04-30 23:03:41
557Cyberwarfare / Information technology audit / Software testing / Vulnerability / Internal control / Information technology management / Information security audit / Security controls / Auditing / Computer security / Data security

Microsoft Word - BCCS report 2008.doc

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2008-07-09 10:19:00
558Computer network security / Hacking / Software testing / Cross-site scripting / Web application security / SQL injection / Vulnerability / Port scanner / Application security / Computer security / Cyberwarfare / Computing

Acunetix Web Vulnerability Scanner

Add to Reading List

Source URL: www.acunetix.com

Language: English - Date: 2014-10-01 13:06:52
559Hacking / Software testing / Computer network security / Vulnerability / Software bug / Malware / McAfee / Application security / Cyberwarfare / Computer security / Security

Building an Effective Application Security Practice on a Shoestring Budget John Viega David Coffey

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
560Computing / Hacking / Software testing / Vulnerability / Operating system / Firewall / Windows / Network security / Application firewall / Computer security / Cyberwarfare / Computer network security

Justifying Security Spending

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:48:18
UPDATE