Security testing

Results: 3214



#Item
51Issue LIX • FebruaryFundamentals of SOA Security Testing by Mamoon Yunus, CEO of Crosscheck Networks Abstract: This article describes the foundations of SOA security testing including functional, performance, in

Issue LIX • FebruaryFundamentals of SOA Security Testing by Mamoon Yunus, CEO of Crosscheck Networks Abstract: This article describes the foundations of SOA security testing including functional, performance, in

Add to Reading List

Source URL: www.servicetechmag.com

Language: English - Date: 2012-02-20 16:15:24
52Microsoft PowerPoint - ApplicationAssessmentTechniques_OWASPNoVa_20090806.ppt [Compatibility Mode]

Microsoft PowerPoint - ApplicationAssessmentTechniques_OWASPNoVa_20090806.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:33
53Computer security / Security / Prevention / Federal Information Security Management Act / Risk management framework / Government procurement in the United States / Information security / Security controls / Risk management / FIPS 140-2 / Information assurance / Security testing

U.S. Department of Commerce National Oceanic and Atmospheric Administration Office of the Chief Information Officer NOAA Security Assessment & Authorization [System Name – ID]

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-01-16 08:19:40
54Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
55PCI DSS Penetration Testing Standard for University of Tennessee Merchants Revision: August 25, 2015 Purpose To outline the key roles and responsibilities, requirements, and notification methods

PCI DSS Penetration Testing Standard for University of Tennessee Merchants Revision: August 25, 2015 Purpose To outline the key roles and responsibilities, requirements, and notification methods

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-03-28 09:34:18
56IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID  1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-05-05 11:12:03
57Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
58Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
59Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015  About our Cryptographic and

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
60Microsoft PowerPoint - SecuringAndModernizingApplicationsForTexasStateAgencies_Content.ppt [Compatibility Mode]

Microsoft PowerPoint - SecuringAndModernizingApplicationsForTexasStateAgencies_Content.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:42