Security testing

Results: 3214



#Item
671Fortify Software / Software quality / Vulnerability / Software testing / Computer security / Cyberwarfare

Dynamic Taint Propagation Finding Vulnerabilities Without Attacking Brian Chess / Jacob West Fortify Software

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:23
672PlanetLab / Software testing / Information / Copyright law of the United States / Copyright infringement / Notice of Claimed Infringement / Copyright / BitTorrent / Law / Data

[PL #Re: X, X., IMP, , Ticket, To AS-CS-CO... https://lists.planet-lab.org/mailman/private/support-community/... [PL #Re: X, X., IMP, , Ticket, To AS-CS-COMM, Security-Copyright

Add to Reading List

Source URL: www.planet-lab.org

Language: English - Date: 2011-02-22 16:10:24
673Electric power / Electricity / Electrical safety / Electricians / Occupational safety and health / National Inspection Council for Electrical Installation Contracting / Portable appliance testing / Electrical contractor / Apprenticeship / Electromagnetism / Electrical wiring / Education

Welcome to Uxbridge College Building Services – Electrical Installation, Plumbing & Security Electrical and Electronics Mechanical and Manufacturing

Add to Reading List

Source URL: www.uxbridge.ac.uk

Language: English - Date: 2014-08-12 04:52:45
674Hypothesis testing / Knowledge / Statistical hypothesis testing / Experiment / Validity / Hypothesis / Type I and type II errors / P-value / Statistical significance / Statistics / Science / Design of experiments

Common Pitfalls in Writing about Security and Privacy Human Subjects Experiments, and How to Avoid Them Stuart Schechter Microsoft Research

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2011-10-23 21:58:31
675Cyberwarfare / Embedded Linux / Cloud clients / Hacking / Software testing / Android / Vulnerability / Intent / Privilege escalation / Smartphones / Computing / Computer security

Improving the Security of Android Inter-Component Communication Adam Cozzette,∗ Kathryn Lingel,∗ Steve Matsumoto,∗ Oliver Ortlieb,∗ Jandria Alexander,† Joseph Betser,† Luke Florer,† Geoff Kuenning,∗ John

Add to Reading List

Source URL: www.lasr.cs.ucla.edu

Language: English - Date: 2014-07-08 18:06:34
676Software testing / Security / Hacking / Penetration test / Electronic commerce / Vulnerability / Attack / SAINT / Application security / Computer network security / Computer security / Cyberwarfare

Microsoft Worddoc

Add to Reading List

Source URL: www.e-cop.net

Language: English - Date: 2011-04-26 10:49:51
677Cyberwarfare / Computer network security / Hacking / Penetration test / Vulnerability / Social vulnerability / Campaign for Nuclear Disarmament / Exploit / Software testing / Computer security / Risk

Automated Vulnerability Assessment Service (AVAS)

Add to Reading List

Source URL: www.cndltd.com

Language: English - Date: 2015-04-06 08:53:22
678National security / Computer security / Safety / Software testing / Vulnerability / Information security / Emergency management / Usability / Computer-assisted web interviewing / Security / Public safety / Crime prevention

Towards Understanding IT Security Professionals and Their Tools David Botta, Rodrigo Werlinger, Andre´ Gagne´ Konstantin Beznosov, Lee Iverson, Sidney Fels, Brian Fisher University of British Columbia, Vancouver, Canad

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-01 12:05:22
679Security / Software testing / Hacking / Vulnerability / CVSS / Security testing / Buffer overflow / Attack / Uncontrolled format string / Cyberwarfare / Computer security / Computer network security

Unforgivable Vulnerabilities Steve Christey The MITRE Corporation August 2, 2007

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:37
680Computer network security / Software testing / Rapid7 / Metasploit Project / Penetration test / Bain Capital Ventures / Federal Information Security Management Act / Vulnerability / CVSS / Software / Computer security / System software

Company Overview History Rapid7 offers solutions for: Headquartered in Boston, MA, Rapid7 was founded inIn response to the

Add to Reading List

Source URL: information.rapid7.com

Language: English - Date: 2015-04-26 23:49:14
UPDATE