Security testing

Results: 3214



#Item
711Software quality / Cyberwarfare / Vulnerability / Buffer overflow / Fuzz testing / Stack / Heap overflow / Exploit / Memory safety / Software bugs / Software testing / Computer security

Automatic Patch-Based Exploit Generation is Possible: Techniques and Implications David Brumley, Pongsin Poosankam Dawn Song Jiang Zheng {dbrumley,ppoosank}@cs.cmu.edu

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
712Military intelligence / Developmental psychology / Educational psychology / Psychological testing / Ambient intelligence / Robert S. Taylor / Intelligence / National security / Data collection

Contents INTRODUCTION . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 1 PART 1: INFORMATION SCIENCE AND INTELLIGENCE: REMINISCENCES AND REFLECTIONS FROM WORLD WAR II TO TODAY C

Add to Reading List

Source URL: books.infotoday.com

Language: English - Date: 2011-11-30 22:44:17
713Computing / HEAnet / Software testing / Computer network security / Internet Relay Chat / Network security / Port / Vulnerability / Denial-of-service attack / Computer security / Cyberwarfare / Education in the Republic of Ireland

HEAnet Network scanning service. Overview The HEAnet Network Scanning Service is a vulnerability and risk assessment service that will allow HEAnet clients to scan their IP networks for security holes which, if not fixed

Add to Reading List

Source URL: heanet.ie

Language: English - Date: 2014-10-23 10:11:14
714Security / Software testing / Hacking / Vulnerability / Penetration test / Areva / Cross-site scripting / Attack / Social vulnerability / Computer security / Cyberwarfare / Computer network security

Vulnerability Assessment and Penetration Testing AREVA’s Vulnerability Assessments identify and quantify vulnerabilities, and provide recommendations to eliminate or mitigate the risk. Our Penetration Testing uses adva

Add to Reading List

Source URL: us.areva.com

Language: English - Date: 2014-06-17 12:21:47
715Business / Anticipatory thinking / Source code / Software assurance / Debian / Software development / Software security assurance / Software testing / Software quality / Computing / Software

Software Assurance Marketplace Use Case Infrastructure Operator May 2013, Revision 1.0 Overview The Software Assurance Marketplace (SWAMP) will support five user communities as shown in the

Add to Reading List

Source URL: continuousassurance.org

Language: English - Date: 2014-02-28 04:44:56
716Computer security / Computer network security / Veracode / Software testing / Application security / Software as a service / Vulnerability / Application firewall / Computing / Centralized computing / Cloud computing

VERACODE APPLICATION SECURITY Speed your innovations to market — without sacrificing security Web applications are the #1 attack vector for data breaches, yet only 10% of enterprises test all their critical application

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2015-04-14 16:19:18
717Internet protocols / Internet / Lightweight Directory Access Protocol / Local area networks / Kerberos / PERMIS / Virtual LAN / Computer security / Computing / Internet standards / Directory services

Secure Network Performance Testing using SeRIF Charles J. Antonelli Center for Information Technology Integration University of Michigan Laurence Kirchmeier

Add to Reading List

Source URL: citi.umich.edu

Language: English - Date: 2005-06-22 20:14:25
718Statistics / Software testing / Psychometrics / Hacking / Penetration test / Vulnerability / Social engineering / Attack / Statistical hypothesis testing / Computer network security / Cyberwarfare / Computer security

Quantitative Penetration Testing with Item Response Theory Florian Arnold*, Wolter Pieters t and Marielle Stoelinga* *Formal Methods & Tools Group, Department of Computer Science University of Twente, Enschede, T he Neth

Add to Reading List

Source URL: eprints.eemcs.utwente.nl

Language: English - Date: 2014-11-14 05:24:58
719Failure / Code Red / Hacking / Software testing / Vulnerability / Buffer overflow / Computer virus / Computer worm / Attack / Cyberwarfare / Computer security / Computer network security

Microsoft Word - PrestonLoftonEiC.doc

Add to Reading List

Source URL: www.mcandl.com

Language: English - Date: 2012-06-07 14:18:01
720Computing / Hacking / Software testing / Hacker / Malware / Denial-of-service attack / Vulnerability / Exploit / OWASP / Computer security / Cyberwarfare / Computer network security

Webapp Security Fengshui (HKEx-Triggered Edition) 網站漏洞風水(港交所加強版) {Alan  Ho,  Anthony  Lai},  VXRL   VXRL

Add to Reading List

Source URL: archive.isoc.hk

Language: English - Date: 2011-09-08 09:46:04
UPDATE