Security testing

Results: 3214



#Item
571Computer network security / Hacking / Software testing / Vulnerability / SAINT / CVSS / Internet Explorer / Critical infrastructure protection / Microsoft Windows / Cyberwarfare / Computer security / Computing

NERC CIP Vulnerability Assessment Report Report Generated: March 19, Background NERC introduced its Critical Infrastructure Protection (CIP) Reliability Standards CIPthrough CIPinIn 2009, it

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2013-03-21 09:36:41
572Cyberwarfare / Software testing / Crime prevention / National security / Penetration test / Application security / Vulnerability / Information security / Code audit / Computer security / Computer network security / Security

U.S. Public Sector HP Vulnerability Assessment Services Increase awareness of growing security threats At-A-Glance

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:55:15
573Software quality / SQL injection / Vulnerability / Test script / White-box testing / Penetration test / Web application security scanner / Software testing / Computer security / Cyberwarfare

Toshi’s Approach to Runtime Analysis Black Box Scanning Tool + White Box Testing Tool

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
574Risk / Software testing / Computer security / Security / Risk management / Penetration test / Vulnerability / Actuarial science / Management / Ethics

Case Study: Medical Product Security Assessment (Document NoSolutions For Advanced Services Altius Information Technologies, Inc. Delivering higher business performance

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:40
575Lifeboats / Rafts / MOT test / Navigation light / China Maritime Safety Administration / Ship / Portable appliance testing / Sailing / Safety / Transport / Security

Rev 1.3 January 2002 Are you aware of what SAMSA and the various Regulations require of you? The various Acts and regulations place the onus on the owner and in some cases the master as well, to ENSURE that the vessel an

Add to Reading List

Source URL: www.samsa.org.za

Language: English - Date: 2014-06-09 06:32:19
576Security / Software testing / Hacking / Vulnerability / SAINT / CVSS / Federal Information Security Management Act / Password / Information security / Computer security / Cyberwarfare / Computer network security

FISMA Vulnerabilities Assessment Report Report Generated: March 20, Background The E-Government Act (Public Lawpassed by the 107th Congress and signed into law by the President in December 2002 recogni

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2013-03-21 09:36:07
577Software testing / Computer security / Auditing / Evaluation / Risk assessment / Vulnerability / Information technology security audit / Audit / Security / Risk / Safety

Case Study: County Security Vulnerability Assurance (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:42
578Software testing / Computer network security / Industrial automation / SCADA / Telemetry / Vulnerability / Metasploit Project / Security / Computer security / Cyberwarfare / Technology

      CRITICAL  INFRASTRUCTURE  AND  COMPUTER  SECURITY:   Incentives  and  Policy  in  the  Internet  Era  

Add to Reading List

Source URL: groups.csail.mit.edu

Language: English - Date: 2014-08-10 09:48:27
579Common Criteria / Security Target / Protection Profile / Evaluation Assurance Level / Accreditation / ITSEC / Common Criteria Testing Laboratory / Cryptographic Module Testing Laboratory / Evaluation / Computer security / Security

Microsoft Word - ASNITE0019T20120207e.doc

Add to Reading List

Source URL: www.nite.go.jp

Language: English - Date: 2015-05-07 21:15:52
580Cyberwarfare / Security / Penetration test / Application security / Security testing / Web application security / Vulnerability / Cloud testing / Software testing / Computer network security / Computer security

Pantone 641C Pantone 377C Penetration testing systems since 1989 Enex TestLab offers fully independent, cost effective

Add to Reading List

Source URL: www.testlab.com.au

Language: English - Date: 2014-11-05 20:39:59
UPDATE