Security testing

Results: 3214



#Item
801Risk / Computer network security / Software testing / Hacking / Vulnerability / Social vulnerability / Debian / IBM / Zero-day attack / Security / Computer security / Computing

December[removed]IBM Internet Security Systems™ X-Force® Research and Development Team Vulnerability Guidelines

Add to Reading List

Source URL: www-935.ibm.com

Language: English - Date: 2008-12-05 19:31:05
802DNA / DNA profiling / Molecular biology / Expectation of privacy / Security / Biology / Privacy law / Biometrics

Glenn Joseph Raynor v. State of Maryland, No. 69, September Term[removed]CRIMINAL PROCEDURE — SEARCH AND SEIZURE — REASONABLE EXPECTATION OF PRIVACY — DNA TESTING — The test for ascertaining whether a particular fo

Add to Reading List

Source URL: www.eff.org

Language: English - Date: 2015-02-19 12:13:07
803Technology / Bandwidth / Iperf / Wi-Fi / Wireless security / Throughput / Proxy server / Internet / Wireless access point / Network performance / Electronics / Computing

CALIFORNIA Assessment of Student Performance and Progress Technical Specifications Manual for Online Testing Winter/Spring 2015

Add to Reading List

Source URL: californiatac.org

Language: English - Date: 2015-04-16 14:35:09
804Computer network security / Software testing / Data management / SQL / SQL injection / Relational database management systems / Penetration test / Vulnerability / Web application security / Computing / Computer security / Cyberwarfare

The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

Add to Reading List

Source URL: www.dbnetworks.com

Language: English - Date: 2014-04-15 01:06:32
805National security / Computer security / Computer network security / Software testing / Software assurance / Software engineering / Software quality / Vulnerability / Application security / Security / Computing / Crime prevention

[removed]CL ACSAC essay revised for pub changes marked

Add to Reading List

Source URL: www.landwehr.org

Language: English - Date: 2014-08-05 00:33:44
806Computer network security / Software testing / Hacking / Cross-site scripting / Vulnerability / Electronic commerce / Web application security scanner / Application security / Application firewall / Computer security / Cyberwarfare / Computing

Application Vulnerability Trends Report : 2013 Application Vulnerability Trends Report 2013

Add to Reading List

Source URL: expo-itsecurity.ru

Language: English - Date: 2013-03-07 02:16:44
807Security / Hacking / Vulnerability / Electronic voting / Failure / Computer security / Cyberwarfare / Software testing

TO: Edgardo Cortes, Commissioner FROM:

Add to Reading List

Source URL: elections.virginia.gov

Language: English - Date: 2015-04-01 10:43:01
808Exercise / Psychometrics / Sports science / Test / Graduate Record Examinations / Education / Evaluation / Educational psychology

2015 CAASPP Security Breach and Testing Irregularity Report Form

Add to Reading List

Source URL: californiatac.org

Language: English - Date: 2015-03-11 18:05:09
809Evaluation / Systems engineering / Software assurance / Vulnerability / Software security assurance / Penetration test / National Institute of Standards and Technology / Test automation / Quality assurance / Software testing / Software quality / Software engineering

F E AT U R E S T O R Y SAMATE’s Contribution to Information Assurance by Paul E. Black

Add to Reading List

Source URL: hissa.nist.gov

Language: English - Date: 2013-05-07 15:27:57
810Education / General Educational Development / Antivirus software / Software testing / Kaspersky Lab

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report August 6, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-08-06 08:58:41
UPDATE