Security testing

Results: 3214



#Item
731Computing / Computer network security / Hacking / Software bugs / Application security / Vulnerability / Penetration test / Attack patterns / Secure coding / Software testing / Computer security / Cyberwarfare

White paper The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2015-04-01 08:31:14
732Hacking / Software testing / Vulnerability / Debian / Social vulnerability / Trend Micro / Computer security / Software / Cyberwarfare

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2014-12-30 00:29:42
733Computing / System software / Anti-spam techniques / Email spam / Spam / DNSBL / Norton Internet Security / CAN-SPAM Act / Spamming / Internet / Spam filtering

Results of Anti-Spam Solution Testing Opus One February 2007 Opus One tested six anti-spam solutions as well as reputation-based anti-spam services. The goal of the test was to evaluate the effectiveness of the solutions

Add to Reading List

Source URL: www.opus1.com

Language: English - Date: 2007-04-24 01:04:45
734Risk / Computer security / Datagram Transport Layer Security / Tracker / Vulnerability / Codenomicon / Social vulnerability / Cloud9 / Software / Software testing / Computing

153 Somerford Road, Christchurch, Dorset, BH23 3TY, UK Tel: + Fax: + Web: www.datatrackplc.com Email:

Add to Reading List

Source URL: www.datatrackplc.com

Language: English - Date: 2014-04-29 06:44:47
735Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
736Computer network security / Software testing / Electronic commerce / Secure communication / Web application security / Application firewall / Cross-site scripting / Penetration test / Application security / Computer security / Cyberwarfare / Computing

Building Web Applications Security Recommendations for Developers Web applications on Internet-facing systems allow access to everyone and operate 24 hours a day and 7 days a week, which leaves them open to attack.

Add to Reading List

Source URL: www.nsa.gov

Language: English - Date: 2013-07-10 11:37:41
737Security / Software bugs / Software testing / Hacking / Vulnerability / Buffer overflow protection / Exploit / Attack / Buffer overflow / Cyberwarfare / Computer security / Computer network security

Relative Vulnerability: An Empirical Assurance Metric Crispin Cowan, PhD CTO, Immunix

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 11:49:30
738Computer network security / Software testing / Metasploit Project / Rapid7 / Exploit / Penetration test / Attack / Brute-force attack / Evasion / Software / Computer security / Cyberwarfare

Test your defenses more efficiently Rapid7 Metasploit Express helps penetration testers conduct assessments with Metasploit Express your opponents’ moves helps you more efficiently by accelerating common Knowing better

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-08-27 14:54:18
739Computer network security / Software testing / Metasploit Project / Rapid7 / Hacking / Exploit / Penetration test / Attack / Evasion / Computer security / Software / Cyberwarfare

Test your defenses more efficiently Rapid7® Metasploit® Pro helps penetration testers conduct assessments with Metasploit Pro your opponents’ moves helps you more efficiently by accelerating common Knowing better pre

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-09-30 11:57:26
740Vulnerability / Cyberwarfare / Failure / Hacking / Computer security / Software testing

Greenbone Security Manager x-ray your network The Oering

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2015-04-20 09:39:52
UPDATE