Security testing

Results: 3214



#Item
891Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
892Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
893Security / Software testing / Hacking / Electronic commerce / Vulnerability / Network vulnerability scan / Hydrauliska Industri AB / Attack / Social vulnerability / Computer network security / Computer security / Cyberwarfare

HIAB™ Vulnerability Management for Internal Networks Market Landscape External threats like cyber crime and corporate espionage concern many organizations, however, many security breaches are caused by those with acces

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2013-09-06 03:49:26
894Software testing / Source code / Hacking / Vulnerability / Continuous integration / Software bug / Debian / Software quality / Quality assurance / Software development / Computing / Software

Source Code Analysis Made Easy The AppSec How-To Guide: Getting your Developers to Beg for Security Security is fascinating. It touches each and every one of us – whether we’re making an online credit card purchase,

Add to Reading List

Source URL: www.checkmarx.com

Language: English - Date: 2014-12-31 05:11:04
895Data security / Computer law / Software testing / Vulnerability / Federal Information Security Management Act / Information security / Spreadsheet / Point of Access for Providers of Information / Computer security / Security / Cyberwarfare

FedRAMP Plan of Action and Milestones (POA&M) Template Completion Guide

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-03-05 15:48:37
896Cross-platform software / Software testing / Cross-site scripting / JavaScript / HTTP cookie / Vulnerability / Form / Java / Application firewall / Computing / Computer security / Cyberwarfare

SPECTRE: A Tool for Inferring, Specifying and Enforcing Web-Security Policies David Scott and Richard Sharp Computer Laboratory, University of Cambridge, William Gates Building, JJ Thompson Avenue, Cambridge CB3 0FD, UK

Add to Reading List

Source URL: dave.recoil.org

Language: English - Date: 2014-05-31 17:38:32
897Ethics / Thought / Protection Profile / Public key certificate / Validation / Evaluation Assurance Level / Common Criteria Testing Laboratory / National Information Assurance Partnership / Evaluation / Computer security / Common Criteria

ARRANGEMENT on the Recognition of Common Criteria Certificates In the field of

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
898Cyberwarfare / Hacking / Software testing / Source code / Vulnerability / Secure coding / Application security / Coding conventions / Defensive programming / Computing / Computer security / Computer programming

Secure Coding Initiative Jason A. Rafail Monday, May 14th, 2007 © 2007 Carnegie Mellon University

Add to Reading List

Source URL: www.ioc.ornl.gov

Language: English - Date: 2007-05-11 15:41:12
899Security / ISO standards / FIPS 140-2 / Common Criteria / Protection Profile / Security Target / Evaluation Assurance Level / Accreditation / Cryptographic Module Testing Laboratory / Evaluation / Computer security / Cryptography standards

Accredited Laboratory Identification Code Date of first Accreditation Date of last Modification Name of Accredited Laboratory

Add to Reading List

Source URL: www.nite.go.jp

Language: English - Date: 2015-04-16 20:40:31
900Common Criteria / Security Target / Protection Profile / Evaluation Assurance Level / Accreditation / ITSEC / Technischer Überwachungsverein / Labeled Security Protection Profile / Common Criteria Testing Laboratory / Evaluation / Computer security / Security

サブプログラムの名称

Add to Reading List

Source URL: www.nite.go.jp

Language: English - Date: 2015-04-16 20:40:32
UPDATE