Security testing

Results: 3214



#Item
51Computing / Web services / Enterprise application integration / Software / Architectural pattern / Service-oriented architecture / WS-Security / SOA Security / Security Assertion Markup Language / Software testing / XML appliance / Rational Service Tester for SOA Quality

Issue LIX • FebruaryFundamentals of SOA Security Testing by Mamoon Yunus, CEO of Crosscheck Networks Abstract: This article describes the foundations of SOA security testing including functional, performance, in

Add to Reading List

Source URL: www.servicetechmag.com

Language: English - Date: 2012-02-20 16:15:24
52Computer security / Computer network security / Cyberwarfare / Software testing / Computing / OWASP / Application security / Penetration test / Vulnerability

Microsoft PowerPoint - ApplicationAssessmentTechniques_OWASPNoVa_20090806.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:33
53Computer security / Security / Prevention / Federal Information Security Management Act / Risk management framework / Government procurement in the United States / Information security / Security controls / Risk management / FIPS 140-2 / Information assurance / Security testing

U.S. Department of Commerce National Oceanic and Atmospheric Administration Office of the Chief Information Officer NOAA Security Assessment & Authorization [System Name – ID]

Add to Reading List

Source URL: cio.noaa.gov

Language: English - Date: 2015-01-16 08:19:40
54Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
55Computing / Computer security / Payment systems / Economy / Computer law / Information privacy / Payment Card Industry Data Security Standard / Penetration test / Software testing / CDE / Network segmentation / Credit card

PCI DSS Penetration Testing Standard for University of Tennessee Merchants Revision: August 25, 2015 Purpose To outline the key roles and responsibilities, requirements, and notification methods

Add to Reading List

Source URL: 3fup3p2pb35f2iroyz2x2mre.wpengine.netdna-cdn.com

Language: English - Date: 2016-03-28 09:34:18
56Computer security / Computer access control / Access control / Role-based access control / Data security / NIST RBAC model / Role hierarchy / Petri net / PERMIS / XACML / Model-based testing / Reliability engineering

IEEE TRANSACTIONS ON COMPUTERS, MANUSCRIPT ID 1 Automated Model-Based Testing of RoleBased Access Control Using Predicate/Transition Nets

Add to Reading List

Source URL: www.itrust.lu

Language: English - Date: 2015-05-05 11:12:03
57Computer security / Cyberwarfare / Security / Computer network security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicationSecurityWorld_OWASPDC_20090805.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:23
58Cyberwarfare / Computer security / Computing / Computer network security / Threat model / Hacking / Software testing / Threat / STRIDE / Vulnerability / SQL injection / Security

Microsoft PowerPoint - ISSA threat modeling.ppt [Read-Only]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:19
59Cryptography standards / Cryptography / Computer security / Evaluation / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:35
60Computer security / Computer network security / Cyberwarfare / Computing / Software testing / OWASP / Application security / Vulnerability / Penetration test / Legacy system / Web application security / HP Application Security Center

Microsoft PowerPoint - SecuringAndModernizingApplicationsForTexasStateAgencies_Content.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:20:42
UPDATE