Security testing

Results: 3214



#Item
621World Wide Web / Web applications / Web application frameworks / Template engines / Software architecture / Web developer / Web application development / CakePHP / Web application / Software / Computing / Web development

Downloaded from http://dash.za.net/ Key Skills Secure Web Application Design And Development, Normalized Database Design, Web Application Security Auditing, Penetration Testing, Network Vulnerability Assessments, Fixing

Add to Reading List

Source URL: dash.za.net

Language: English - Date: 2015-03-07 18:32:52
622Data security / Computer network security / Cyberwarfare / Firewall / Port scanner / Nmap / Communications protocol / Transmission Control Protocol / Anomaly detection / Computing / Software / Network architecture

Fast Portscan Detection Using Sequential Hypothesis Testing Jaeyeon Jung, Vern Paxson, Arthur W. Berger, and Hari Balakrishnan MIT Computer Science and Artificial Intelligence Laboratory Cambridge, MA USA {jyjung, awberg

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2004-05-13 23:18:43
623Crime prevention / National security / Software testing / Computer network security / Common Criteria / Vulnerability / Application security / Secure coding / Information security / Computer security / Security / Cyberwarfare

The 7th International Common Criteria Conference, 19-21 September, Lanzarote, Spain 20 September, Track 3, 11:00-11:30 am Software Security Reviews - Summarized experiences that led to a new methodology.

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:04:31
624Software testing / Malware / Computer network security / Sandbox / Computer virus / Computer security / Polymorphic code / System software / Software / Antivirus software

White Paper Build a Better Sandbox. Create a working strategy for comprehensive malware protection.

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-10-01 13:49:51
625Computer network security / Software testing / OWASP / Security / Cross-site scripting / Web application security / Cross-site request forgery / Vulnerability / ColdFusion / Computing / Computer security / Cyberwarfare

Bilal Soylu - Application Security 1 PRACTICAL APPLICATION SECURITY

Add to Reading List

Source URL: boncode.net

Language: English - Date: 2011-10-29 15:46:44
626Computer network security / Internet protocols / OSI protocols / Transmission Control Protocol / Snort / Network intrusion detection system / Network packet / Transport layer / Traffic flow / Software / Computing / System software

A Tool for Offline and Live Testing of Evasion Resilience in Network Intrusion Detection Systems (Extended Abstract) Leo Juan1 , Christian Kreibich2 , Chih-Hung Lin1 , and Vern Paxson2 1

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-05-23 21:17:18
627Data security / Software testing / Security / Hacking / Information security / National Institute for Smart Government / Penetration test / Hacker / Email / Computing / Computer security / Computer network security

JOB DESCRIPTION 1 Information Security Compliance In-charge 1.1

Add to Reading List

Source URL: nisg.org

Language: English - Date: 2014-07-24 08:44:55
628Cyberwarfare / Data security / Computer network security / Security / Computing / Intrusion detection system evasion techniques / Anomaly detection / Intrusion detection system / Computer security / Synthetic data

Testing Intrusion Detection Systems: A Critique of the 1998 and 1999 DARPA Intrusion Detection System Evaluations as Performed by Lincoln Laboratory JOHN McHUGH Carnegie Mellon University

Add to Reading List

Source URL: www.icir.org

Language: English - Date: 2008-01-25 01:06:21
629Vulnerability / Cyberwarfare / Failure / Software testing / Computer security / Hacking

Rating Attack Potential for Smartcards Alain MERLE, CEA-LETI Technical manager of CESTI LETI on behalf of ISCI (JHAS) group

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2011-10-31 12:01:45
630Computer network security / Software testing / Electronic commerce / Payment systems / Penetration test / Payment Card Industry Data Security Standard / Application security / Information security / Vulnerability / Computer security / Security / Cyberwarfare

Building an Effective Application Security Practice on a Shoestring Budget Authors: David Coffey, John Viega, Abstract:

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
UPDATE