Security testing

Results: 3214



#Item
901Test automation / Regression testing / Acceptance testing / IBM Rational Functional Tester / Book:Software testing / Software testing / Graphical user interface testing / Software

Testing and Tester Evolution Are we Regressing, Stagnating or Advancing? Originally Created for: TISQA 2006:Tomorrow’s Testing Agility, Security and Performance Conference October 5, Chapel Hill, NC

Add to Reading List

Source URL: www.perftestplus.com

Language: English - Date: 2006-10-30 13:44:50
902Software / Norton Internet Security / Software testing / Test case / Test suite

Testlog User Guide © PassMark Software 2011 2

Add to Reading List

Source URL: www.testlog.com

Language: English - Date: 2012-01-02 16:37:56
903Actuarial science / Software testing / Ethics / Risk / Security / Test strategy / Software bug / Software development process / Risk management / Project management / Management / Business

Microsoft Word - SQA for New Things.doc

Add to Reading List

Source URL: www.satisfice.com

Language: English - Date: 2006-05-23 22:43:52
904Computer network security / Crime prevention / National security / Software testing / Vulnerability / Social vulnerability / Information security / Countermeasure / Security / Cyberwarfare / Computer security

Information Security Early Warning Partnership - Overview of Vulnerability Handling Process ■ Framework Establishment In July 2004, the notification from the Ministry of Economy, Trade and Industry on “Standards for

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-04-16 04:31:36
905Vulnerability / Software assurance / Application security / Penetration test / Fuzz testing / National Institute of Standards and Technology / Cross-site scripting / Web application security scanner / SAINT / Computer security / Software testing / Cyberwarfare

Testing Web Application Scanner Tools Elizabeth Fong and Romain Gaucher NIST Verify Conference – Washington, DC, October 30, 2007

Add to Reading List

Source URL: rgaucher.info

Language: English - Date: 2007-11-01 08:41:19
906Security / ISO standards / FIPS 140-2 / Common Criteria / Protection Profile / Accreditation / Security Target / Cryptographic Module Testing Laboratory / FIPS 140-3 / Computer security / Cryptography standards / Evaluation

サブプログラムの名称

Add to Reading List

Source URL: www.nite.go.jp

Language: English - Date: 2015-04-16 20:40:31
907FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / HMAC / FIPS 140-3 / Cryptographic Module Testing Laboratory / Cryptography standards / Cryptography / Computer security

FIPS[removed]Validation Certificate No. 1033

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 21:41:58
908Software testing / Qualys / OWASP / Vulnerability / Security / Hacker / Computer security / Cyberwarfare / Computing

HITB2011AMS  AGENDA  -­‐  CONFERENCE  DAY  1  -­‐  19TH  MAY  2011 TRACK  1 TRACK  2   TRACK  3  /  HITB  LABS

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 13:01:24
909Software as a service / Internet privacy / Cloud storage / Utility computing / Azure Services Platform / Privacy / Cloud computing security / IBM cloud computing / Cloud computing / Centralized computing / Computing

Constructing and Testing Privacy-Aware Services in a Cloud Computing Environment – Challenges and Opportunities (Invited Paper) Lin Gu Shing-Chi Cheung

Add to Reading List

Source URL: webscope.sandbox.yahoo.com

Language: English - Date: 2014-11-13 19:02:24
910Cyberwarfare / Information technology audit / Software testing / Information technology security audit / Threat / Security testing / Attack / Information security audit / Computer security / Computer network security / Security

Security Testing: Step by Step System Audit with Rational Tools First Presented for:

Add to Reading List

Source URL: www.perftestplus.com

Language: English - Date: 2006-02-02 15:46:28
UPDATE