Security testing

Results: 3214



#Item
631Software development / Hacking / Vulnerability / Semantic Web / Software development methodology / Computer security / Software testing / Cyberwarfare

Semantic Web Methodology Semantic Web Methodolgy  Steps for a Semantic Web Methodology

Add to Reading List

Source URL: scap.nist.gov

Language: English
632Hacking / Software testing / Vulnerability / Radware / Bash / Computing / Software / Computer security

Radware Emergency Response Team Threat Alert: Shellshock CVE, CVEVersionRev. 1

Add to Reading List

Source URL: security.radware.com

Language: English - Date: 2014-10-23 10:08:03
633Software testing / Sandbox / Computer security / Google Chrome / Vulnerability / Seccomp / JavaScript / Software bug / Interpreter / Software / Computing / System software

Exploring compartmentalisation hypotheses with SOAAP Khilan Gudka∗ , Robert N. M. Watson∗ , Steven Hand∗ , Ben Laurie† and Anil Madhavapeddy∗ ∗ University of Cambridge - † Google UK

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2012-09-14 11:22:21
634Technology / Software testing / Penetration test / System testing

Netherlands Scheme for Certification in the Area of IT Security (NSCIB) Nederlands Schema voor Certificatie op het

Add to Reading List

Source URL: www.tuv-nederland.nl

Language: English - Date: 2011-12-13 07:27:44
635Computing / Software testing / Hacking / Cross-site scripting / Cross-site tracing / Vulnerability / Electronic commerce / SQL injection / Web application security / Cyberwarfare / Computer security / Computer network security

Challenges of Automated Web Application Scanning "Why automated scanning only solves half the problem." Black Hat Federal Washington D.C. October 2, 2003 © 2003 by WhiteHat Security, Inc.

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:30
636Computer network security / Distributed computing architecture / Inter-process communication / Access control / Software testing / PlanetLab / E / Open proxy / Futures and promises / Computing / Software engineering / Computer programming

Email Prioritization: reducing delays on legitimate mail caused by junk mail

Add to Reading List

Source URL: www.hpl.hp.com

Language: English - Date: 2005-01-21 13:24:49
637Computer network security / Hacking / Software testing / Vulnerability / Attack / Mitre Corporation / Mitre / Cyberwarfare / Computer security / Clothing

Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
638Computer security / Crime prevention / National security / Software testing / IBM cloud computing / Integrated Cloud Service Management / Cloud computing / Centralized computing / Computing

Microsoft Word - Trend Micro Paper 2 draft_Final_AM

Add to Reading List

Source URL: www.trendmicro.co.nz

Language: English - Date: 2014-12-18 20:01:57
639Security / Software testing / Hacking / Advanced persistent threat / Malware / Vulnerability / Stuxnet / Codenomicon / Attack / Cyberwarfare / Computer network security / Computer security

Review of the Year of 2014, the Moment of Network Security ——The annual report of network security in 2014 Security Research and Emergency Response Center of Antiy Labs

Add to Reading List

Source URL: www.antiy.net

Language: English
640Computer network security / Malware / Software testing / Zero-day attack / Vulnerability / FireEye /  Inc. / Operation Aurora / Exploit / Targeted threat / Computer security / Cyberwarfare / Hacking

WHITE PAPER LESS THAN ZERO: A Survey of Zero-day Attacks in 2013 and What They Say About the Traditional Security Model

Add to Reading List

Source URL: www.fireeye.jp

Language: English - Date: 2015-05-01 03:59:23
UPDATE