Security testing

Results: 3214



#Item
661Computer network security / Security / Software testing / OWASP / Application security / Penetration test / Rootkit / X Window System / Computer security / Software / Cyberwarfare

Dynamic Analysis of Android Apps OWASP IL 2014 Erez Metula , Application Security Expert AppSec Labs (Founder)

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2014-09-09 03:50:40
662Computer network security / Crime prevention / National security / Software testing / Computer security / Vulnerability / Data center / Computing / Cloud computing / Concurrent computing

High Assurance in Multi-Layer Cloud Infrastructures Aleksandar 1 Hudic ,

Add to Reading List

Source URL: www.buildingtrustincloud.org

Language: English - Date: 2014-10-09 07:27:43
663Scripting languages / Computer network security / Software testing / Code injection / Machine code / Malware / Metasploit Project / Batch file / Echo / Computing / Software / System software

Microsoft Word - Advanced Command Injection Exploitation-1.doc

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
664Software testing / Computing / Computer network security / Attack patterns / Vulnerability / Application security / Exploit / Buffer overflow / SQL injection / Cyberwarfare / Computer security / Hacking

Attack Patterns as a Knowledge Resource for Building Secure Software Sean Barnum Amit Sethi

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:22
665Computer network security / Metasploit Project / Software testing / Nmap / Exploit / MSF / Cracking of wireless networks / Software / System software / Computer security

Unmanned Aerial Vehicles Exploit Automation with the Metasploit Framework James Lee 1

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:24
666Security / Software testing / OWASP / Penetration test / Logic / SQL injection / Computer network security / Computer security / Cyberwarfare

The Art of Exploiting Logical Flaws in Web Apps Sumit “sid” Siddharth Richard “deanx” Dean A GREAT COLLABORATION!

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:14:23
667Computer network security / Cyberwarfare / Security / Software quality / National security / Attack patterns / Software assurance / Vulnerability / Penetration test / Software testing / Computer security / Hacking

An Introduction to Attack Patterns as a Software Assurance Knowledge Resource OMG Software Assurance Workshop 2007

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2007-03-13 14:59:21
668Software testing / Security / Electronic commerce / National security / Penetration test / Vulnerability / Secure coding / Computer network security / Computer security / Cyberwarfare

WIREDRIVE CHECKMARX’S Case Study About the Company founded inThe Wiredrive team consists of 35 employees and has

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2015-02-26 02:03:44
669Computer network security / Access control / Software testing / Data security / Information security / Managed security service / Unix / Role-based access control / Vulnerability / Security / Computer security / Cyberwarfare

SPECIALIST PROFILE Personal Details Reference: BT2691

Add to Reading List

Source URL: www.bmeurope.com

Language: English - Date: 2013-04-26 11:30:25
670Computing / Cyberwarfare / Email / Social engineering / Vulnerability / Hacking / Software testing / Computer security

CAPEC Content Submission Form

Add to Reading List

Source URL: capec.mitre.org

Language: English - Date: 2013-07-25 16:42:45
UPDATE