Security testing

Results: 3214



#Item
71Computer network security / Kali Linux / OpenVAS / Nmap / Software testing / W3af / BackBox / Penetration test

Workshop MOSS 2016 “How to evaluate the security of cloud applications using open source tools” Description: The purpose of this workshop is to give participants a quick tour of some of the open source tools which ca

Add to Reading List

Source URL: mossconf.ro

Language: English - Date: 2016-03-09 08:01:29
72Hacking / Computer security / Computer network security / Software testing / Vulnerability / Cross-site scripting / Application security / Threat model

Microsoft PowerPoint - DenimGroup_JumpStartYourApplicationSecurityKnowledge_Content.pptx

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:18:55
73Software testing / Computer network security / Computer security / Hacking / Vulnerability / Common Vulnerabilities and Exposures

WhiteHat Logo Primary PANTONE

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-18 19:02:11
74Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / National Institute of Standards and Technology / SHA-1 / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 06:51:53
75Computer security / Computer network security / Hacking / Software testing / Vulnerability / OWASP / Cross-site scripting / Software quality / Application security / Software / Security / HDIV

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:45
76Internet security / Software bugs / Shellshock / Software testing / Bash / Avaya / Vulnerability / Common Vulnerabilities and Exposures / POODLE

INI  Applications  and  the   “Shellshock”  bug  in  BASH   This document is intended to assist in the description, diagnosis, and remediation of the BASH bug known as “Shellshock” as it relates to syste

Add to Reading List

Source URL: www.interactivenw.com

Language: English - Date: 2014-10-07 15:06:31
77Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_OWASPMSP_20090316.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:43
78IBM software / Software testing / Security AppScan / Rational Software / IBM / Rational Unified Process / Software development / Dynamic program analysis / IBM R&D Labs in Israel

Microsoft PowerPoint - AS14.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:40
79Software testing / Codenomicon / Fuzz testing / Computer security / Vulnerability / American fuzzy lop

Fuzzing Practical Considerations Of Fuzzing: Generating Insight into Areas of Risk Jonathan Knudsen

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2016-07-06 08:58:34
80Software testing / Address space layout randomization / Computer network security / Binary hardening / Code injection / SQL injection / Heap / Vulnerability / GrammaTech / Computer security

REPORT DOCUMENTATION PAGE

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
UPDATE