Security testing

Results: 3214



#Item
771Computer network security / Metasploit Project / Software testing / MSF / Exploit / Shellcode / Plug-in / Software / Computer security / Cyberwarfare

Hacking Techniques & Intrusion Detection Fall[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2013-01-18 18:40:00
772Holism / Modularity / Object-oriented programming / Software design / Software testing / Programming language / Computer security / Structured analysis / Modula-3 / Software engineering / Computing / Programming paradigms

Microsoft Word - LM051Prospective

Add to Reading List

Source URL: www.csis.ul.ie

Language: English - Date: 2014-03-20 05:02:02
773Software testing / Computer network security / Source code / Hacking / Vulnerability / Penetration test / Code review / Cross-site scripting / Software quality / Computer security / Cyberwarfare / Computing

Report on Source Code Security Analysis

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-03-30 23:00:24
774Computer network security / Software testing / Data security / Application security / OWASP / Data breach / Vulnerability / Computer security / Cyberwarfare / Security

Your most valuable asset: your users’ data Dr Konstantinos Papapanagiotou Innovating for Privacy, Athens, [removed]

Add to Reading List

Source URL: ellak.gr

Language: English - Date: 2015-04-06 07:50:31
775Computer security / Hacking / Software testing / Vulnerability / Risk / Management / Ethics / Risk management

Formal Analysis of Security Metrics and Risk Leanid Krautsevich1, Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2011-08-10 05:58:47
776Education / Crime prevention / National security / Electronic commerce / Evaluation / Penetration test / Computer security / Central Intelligence Agency / Test / Computer network security / Security / Software testing

Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-10-22 19:34:57
777Project management / Computer network security / Penetration test / Scope / C / Software engineering / Computing / Software testing

Hacking Techniques & Intrusion Detection Winter Semester[removed]Dr. Ali Al-Shemery aka: B!n@ry

Add to Reading List

Source URL: www.binary-zone.com

Language: English - Date: 2012-10-30 12:43:55
778Rapid7 / SCADA / Computer network security / Software testing / Software / System software / Free software

Nexpose Training Menu Introduction to product functionality 

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-03-27 14:36:32
779Computer network security / Hacking / Software testing / Penetration test / White hat / Application security / Hacker / Vulnerability / Metasploit Project / Computer security / Cyberwarfare / Computing

Page 1 9:59 AM[removed]qrk:preview their own laptops to attach to the labs (with appropriate caution). Students must have a working

Add to Reading List

Source URL: blackhat.com

Language: English - Date: 2014-12-16 19:06:00
780Cyberwarfare / Security / Computer network security / Quality assurance / Software assurance / Standards organizations / Vulnerability / Penetration test / National Institute of Standards and Technology / Software quality / Computer security / Software testing

Software Assurance During Maintenance Paul E. Black U.S. National Institute of Standards and Technology (NIST) [removed] Abstract

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
UPDATE