Security testing

Results: 3214



#Item
611Data security / Security / Software testing / Hacking / Information security / Penetration test / Hacker / Email / Vulnerability / Computing / Computer security / Computer network security

JOB DESCRIPTION 1 Information Security Compliance In-charge 1.1

Add to Reading List

Source URL: nisg.org

Language: English - Date: 2015-02-11 05:02:20
612National security / United States government secrecy / Computer network security / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Protection Profile / Common Criteria / Committee on National Security Systems / Security / Computer security / Evaluation

Committee on National Security Systems CNSS Policy NoJune 2013 NATIONAL POLICY GOVERNING THE ACQUISITION OF

Add to Reading List

Source URL: cryptome.org

Language: English - Date: 2013-07-09 07:21:16
613Software testing / Computer security / Hacking / Vulnerability / USENIX / Frog / Mark and recapture / Application security / Fault / Geology / Security / Statistics

COLUMNS For Good Measure The Undiscovered DAN GEER Dan Geer is the CISO for

Add to Reading List

Source URL: geer.tinho.net

Language: English - Date: 2015-04-01 20:32:02
614Industrial engineering / O-ring / Security / Permeation / Packaging and labeling / Seal / Silicone rubber / Radial shaft seal / Package testing / Technology / Packaging / Business

A Competent Authorities Guide To The Applicability Of Elastomerie Seal Materials Used in Radioactive Material Transport Packages

Add to Reading List

Source URL: www.onr.org.uk

Language: English - Date: 2014-12-05 08:23:08
615Computing / Data security / Intrusion detection system / Evasion / Anomaly detection / Denial-of-service attack / Network intrusion detection system / Intrusion detection system evasion techniques / Computer network security / Cyberwarfare / Computer security

NISTIR 7007, An Overview of Issues in Testing Intrusion Detection Systems

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-11-09 09:31:11
616Computer network security / Hacking / Vulnerability / Penetration test / Common Criteria / Social vulnerability / Computer security / Software testing / Cyberwarfare

Vulnerabilities, Vulnerabilities, Vulnerabilities

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:30
617Computer network security / Electronic commerce / Hacking / Software testing / Vulnerability / Open Vulnerability and Assessment Language / Nessus / Security Technical Implementation Guide / Critical infrastructure protection / Computer security / Cyberwarfare / Security

Secure Configuration Remediation Tool Task Order Title Department of Defense (DoD)-wide Enterprise License for an automated Secure Configuration Remediation (SCR) tool.

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2006-04-11 15:56:22
618Template engines / Web application frameworks / Web development / Web applications / Web developer / Web application development / Mailto / CakePHP / Web application security / Software / Computing / World Wide Web

Downloaded from _http://dash.za.net_/ Key Skills Secure Web Application Design And Development, Normalized Database Design, Web Application Security Auditing, Penetration Testing, Network Vulnerability Assessments, Fixin

Add to Reading List

Source URL: dash.za.net

Language: English - Date: 2015-03-07 18:16:02
619Computer network security / Crime prevention / National security / Software testing / Vulnerability / Social vulnerability / Information security / Countermeasure / Security / Cyberwarfare / Computer security

Information Security Early Warning Partnership - Overview of Vulnerability Handling Process ■ Framework Establishment In July 2004, the notification from the Ministry of Economy, Trade and Industry on “Standards for

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-04-30 23:09:40
620Denial-of-service attacks / Denial-of-service attack / Internet Relay Chat / Software testing / Exploit / Vulnerability / Attack / Attack patterns / Computer insecurity / Cyberwarfare / Computer network security / Computer security

DDoS for Zombies John "JI" Ioannidis AT&T Labs – Research

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2003-10-09 02:05:59
UPDATE