Security testing

Results: 3214



#Item
781Software testing / Software bugs / Computer network security / Hacking / Coverity / Vulnerability / Application security / Social vulnerability / Fortify Software / Cyberwarfare / Computer security / Software quality

Manual vs. Automated Vulnerability Assessment: A Case Study James A. Kupsch and Barton P. Miller Computer Sciences Department, University of Wisconsin, Madison, WI, USA {kupsch,bart}@cs.wisc.edu Abstract

Add to Reading List

Source URL: pages.cs.wisc.edu

Language: English - Date: 2009-06-01 10:19:43
782Computer network security / Software testing / Crime prevention / National security / Metasploit Project / Data security / Rapid7 / Information security / Password / Computer security / Software / Cyberwarfare

case study | Securing a City: Corpus Christi Assesses, Prioritizes, and Monitors Threats “Risk is real. That’s the key message.” Bob Jones is the Information Security Manager for the City of Corpus Christi, Texas

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:34
783Computer network security / Software testing / Crime prevention / National security / Rapid7 / Metasploit Project / Vulnerability / Information security / Hacker / Software / Computer security / System software

Industry: All Website: principlelogic.com CHALLENGE: As an independent consultant, Principle Logic, LLC needed to

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-04-08 09:27:01
784Smartphones / Data security / Software testing / Vetting / Vulnerability / Application security / Application software / IOS / Information security / Computing / Security / Computer security

Guidance for Secure Authorization of Mobile Applications in the Corporate Environment

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2015-03-19 09:48:47
785Security / Computing / OWASP / Software testing / WebScarab / CCWAPSS / Computer security / Computer network security / Cyberwarfare

Application Security for the Masses Konstantinos Papapanagiotou OWASP Greek Chapter Leader Syntax IT Inc

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:32
786Risk / Software testing / Rapid7 / Carnegie Mellon University / Social vulnerability / Vulnerability / Information security / Carnegie Mellon Silicon Valley / Software / Computer security / System software

Vulnerability Management Case Study Rapid7 Nexpose Meets Carnegie Mellon University’s Requirements for Vulnerability Management, Co-Development and Higher Education Expertise Broadening Protection to Ensure Campus-Wid

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2014-06-06 17:53:55
787Object-oriented programming / Software design / Computer science / Software testing / Software engineering / Information systems / Cloud computing / Computer security / DIT School of Computing / Computing / Computer science education / Security

MSc(CompSc)-1 REGULATIONS FOR THE DEGREE OF MASTER OF SCIENCE IN COMPUTER SCIENCE (MSc[CompSc]) (See also General Regulations)

Add to Reading List

Source URL: www.asa.hku.hk

Language: English - Date: 2013-12-23 05:59:33
788Animal testing / Information technology audit / Data security / Auditing

Regulations, Policies and Procedures Academic Procedure A11 Monitoring and Evaluation Procedure 1.

Add to Reading List

Source URL: belgrade.sae.edu

Language: English - Date: 2013-09-06 04:57:02
789Crime prevention / National security / Data security / Scientific method / Computer security / Information security / Scientific theory / Statistical hypothesis testing / Hypothesis / Science / Security / Philosophy of science

The evolution of information security | Adam Shostack B

Add to Reading List

Source URL: www.homeport.org

Language: English - Date: 2014-06-11 12:01:54
790Software testing / Computer network security / Crime prevention / National security / Software security assurance / Vulnerability / Penetration test / Application security / Proprietary software / Security / Computer security / Cyberwarfare

Tips and Tricks Guide To tm Software Security Assurance

Add to Reading List

Source URL: www.principlelogic.com

Language: English - Date: 2009-08-04 07:42:58
UPDATE