Security testing

Results: 3214



#Item
581Auditing / Security / Information technology audit / Standards / Software testing / Penetration test / Information Systems Audit and Control Association / Certified Information Security Manager / Information security management / Computer security / Data security / Computing

CESG Certified Professional Scheme – qualification requirements For practitioner applications we require proof of a relevant information assurance certification. A copy of your certificate must be provided along with y

Add to Reading List

Source URL: certifications.bcs.org

Language: English - Date: 2014-10-01 04:18:04
582Failure / Computer network security / Software testing / Vulnerability database / Vulnerability / Social vulnerability / Attack / Cyberwarfare / Risk / Computer security

SOFTWARE VULNERABILITY ANALYSIS A Thesis Submitted to the Faculty of Purdue University

Add to Reading List

Source URL: www.dbnet.ece.ntua.gr

Language: English - Date: 2001-12-12 02:52:38
583Risk / Software testing / Hacking / Cross-site scripting / Cross-site request forgery / Vulnerability / Code injection / Remote file inclusion / SQL injection / Cyberwarfare / Computer security / Failure

Attack Vector Detail Report Atlassian Report As Of Tuesday, March 24, 2015

Add to Reading List

Source URL: www.atlassian.com

Language: English - Date: 2015-05-09 18:02:05
584Computer network security / Hacking / SAINT / Penetration test / Vulnerability / Social vulnerability / SecurityMetrics / Nessus / Computer security / Software testing / Cyberwarfare

» GROUP TEST l Vulnerability assessment There have been few changes on the vulnerability assessment landscape, but the field is maturing, converging and gaining depth rapidly, says Peter Stephenson. T

Add to Reading List

Source URL: www.saintcorporation.com

Language: English - Date: 2009-05-15 11:45:12
585Network architecture / Computer network security / PlanetLab / Software testing / Overlay network / Node / Yahoo! / Firewall / Computer cluster / Computing / Computer networking / Distributed computing architecture

Pervasive Computing Research at

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2011-02-22 16:10:24
586Computer network security / Nmap / Port scanner / Pcap / Firewall / Iptables / Stateful firewall / Transmission Control Protocol / Port / Software / Computing / System software

Firewall Testing Cameron Kerr Telecommunications Programme University of Otago May 16, 2005 Abstract

Add to Reading List

Source URL: www.telecom.otago.ac.nz

Language: English - Date: 2009-05-09 04:30:39
587Actuarial science / Risk management / Software testing / Security / Risk assessment / Penetration test / Vulnerability / Medical device / Risk / Management / Ethics

Case Study: Security Risk Assessment (Document NoSolutions For Advanced Services Altius Information Technologies, Inc. Delivering higher business performance

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:43
588Computer network security / Software testing / Auditing / Database security / Vulnerability / Information technology security audit / Application security / Audit / TRAC / Security / Cyberwarfare / Computer security

Case Study: Web Application & Database Security Audit (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:47
589Semantic Web / Natural language processing / Computer network security / Penetration test / Software testing

Application of Semantic Techniques to CC Problems

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:31
590Computing / Computer network security / Core Security Technologies / Software testing

Black_Hat_2009_DC_Attendee_Snapshot

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:13
UPDATE