Security testing

Results: 3214



#Item
81ISO standards / Common Criteria / Security Target / Evaluation / Tests / Computer security / Common Criteria Testing Laboratory / Crime prevention / Data security

Process for Empanelment and Operation of labs under IC3S (STQC/CC/D03) Issue : 03

Add to Reading List

Source URL: www.commoncriteria-india.gov.in

Language: English - Date: 2014-11-20 05:22:06
82Cryptography standards / Cryptographic Module Validation Program / FIPS 140-2 / Advanced Encryption Standard / FIPS 140 / FIPS 201 / Common Criteria / National Voluntary Laboratory Accreditation Program / SHA-1 / National Institute of Standards and Technology / Cryptographic Module Testing Laboratory

Cryptographic and Security Testing Laboratory Deputy Laboratory Director, CST Laboratory Manager © atsec information security, 2015 About our Cryptographic and

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:48:48
83Computer security / Computer network security / Data security / Application security / Certified Information Systems Security Professional / Enterprise software / Software / Web application security / HP Application Security Center

Black Box versus White Box: Different App Testing Strategies John B. Dickson, CISSP Learning objectives for today’s session – Understand different types of application

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:25
84Nuclear weapons / Nuclear disarmament / Nuclear proliferation / Treaty on the Non-Proliferation of Nuclear Weapons / Nuclear weapons testing / Tactical nuclear weapon / Weapon of mass destruction / Nuclear warfare / National Nuclear Security Administration / Pre-emptive nuclear strike / Stockpile stewardship / Enduring Stockpile

Western States Legal Foundation Issue Brief FallFewer But Newer: the Role of Nuclear Weapons

Add to Reading List

Source URL: www.wslfweb.org

Language: English - Date: 2014-08-08 15:37:21
85Software testing / Cloud infrastructure / Automation / Test automation / Cloud computing / Landesbank Baden-Wrttemberg / Computer security

Baden-Württembergische_Bank_text_logo_black

Add to Reading List

Source URL: testobject.com

Language: English - Date: 2016-06-06 10:28:57
86Nuclear weapons of the United States / Nuclear weapons / Lawrence Livermore National Laboratory / B61 nuclear bomb / Enduring Stockpile / National Nuclear Security Administration / Stockpile stewardship / Pit / W80 / Nuclear Posture Review / Nuclear weapons testing / Nuclear warfare

Statement of John A. Gordon Under Secretary for Nuclear Security and Administrator, National Nuclear Security Administration U. S. Department of Energy Before the Committee on Armed Services

Add to Reading List

Source URL: www.wslfweb.org

Language: English - Date: 2014-08-08 15:37:52
87Hacking / Software testing / Vulnerability / Computer security

Schedule UbiCrypt Summer School SYSTEMS SECURITY| July 20-23, 2015 Time 08:30-09:00 09:00-10:30 10:30-11:00 11:00-12:30

Add to Reading List

Source URL: www.ubicrypt.hgi.rub.de

Language: English - Date: 2015-07-10 06:56:20
88Computer security / Computer network security / Application security / Software testing / Application firewall / Mobile security / Fortify Software / Vulnerability / Software as a service

1 Issue 2 1 Seismic shift needed toward application security 2 Critical differentiator

Add to Reading List

Source URL: saas.hpe.com

Language: English - Date: 2015-09-16 16:49:11
89Software testing / Program analysis / Software review / Concurrent programming languages / Cross-platform software / Static program analysis / Dynamic program analysis / Programming tool / Lint / Application security / Software quality / Java

http://www.stickyminds.com/BetterSoftware/magazine.asp?fn=cifea

Add to Reading List

Source URL: www.agitar.com

Language: English - Date: 2011-06-20 15:01:26
90Software testing / Extreme programming / Continuous integration / Vulnerability / Regression testing / Code coverage / Software quality / Unit testing / Dynamic program analysis

Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Early and Often: Avoiding Security Flaws with Continuous Integration with High Code Coverage Security vulnerabilities are cau

Add to Reading List

Source URL: www.agitar.com

Language: English - Date: 2011-07-20 16:45:50
UPDATE