Security testing

Results: 3214



#Item
941Software testing / Application security / Jama Software / Vulnerability / Cross-site scripting / Vulnerability management / Penetration test / Computer security / Cyberwarfare / Computing

Jama Product Delivery Solution Application Testing Jama Software / Project Number: OPRevision Number: 1.0 Date:

Add to Reading List

Source URL: www.jamasoftware.com

Language: English - Date: 2014-06-02 18:09:19
942Action / Protection Profile / Security Target / Security / Information technology management / Cryptographic Module Testing Laboratory / Evaluation Assurance Level / Evaluation / Computer security / Common Criteria

Microsoft Word - CCpart1v2.4rev256.doc

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
943FIPS 140-2 / FIPS 140 / Advanced Encryption Standard / HMAC / Cryptographic Module Testing Laboratory / FIPS 140-3 / Cryptography standards / Cryptography / Computer security

FIPS[removed]Validation Certificate No. 1031

Add to Reading List

Source URL: csrc.nist.gov

Language: English - Date: 2012-07-23 21:45:35
944Cyberwarfare / Computer network security / Software testing / Common Criteria / National security / Security Target / Vulnerability / Evaluation Assurance Level / Cimcor / Computer security / Evaluation / Security

Common Methodology for Information Technology Security Evaluation CEM-2001/0015R Part 2:

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
945Security / Hacking / Software testing / Full disclosure / Kloxo / Vulnerability / Stakeholder / Cross-site scripting / Countermeasure / Computer security / Cyberwarfare / Computer network security

Have we Crossed the Line? The Growing Ethical Debate in Modern Computer Security Research David Dittrich University of Washington Michael Bailey

Add to Reading List

Source URL: mdbailey.ece.illinois.edu

Language: English - Date: 2014-08-05 13:28:18
946Trend Micro Internet Security / Software / Evaluation / Software testing / Antivirus software / Computer security / Matousec

Proactive Security Challenge report www.matousec.com, DIFINEX LTD Proactive Security Challenge report March 30, 2010

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2013-08-29 12:02:32
947Security Target / Evaluation Assurance Level / Protection Profile / Trusted Computer System Evaluation Criteria / ITSEC / Cryptographic Module Testing Laboratory / Labeled Security Protection Profile / Computer security / Evaluation / Common Criteria

Common Criteria This brochure was produced by Syntegra on behalf of the Common Criteria Project Sponsoring Organisations

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
948Common Criteria / Protection Profile / Security Target / Cryptographic Module Testing Laboratory / XTS-400 / Evaluation / Computer security / Security

Common Criteria for Information Technology Security Evaluation Part 1: Introduction and general model June 2005

Add to Reading List

Source URL: www.niap-ccevs.org

Language: English - Date: 2009-10-08 10:40:04
949Education / Outpost Firewall Pro / Shareware / Agnitum / General Educational Development / Software testing / Software / Antivirus software

Proactive Security Challenge 64 Testing Report Proactive Security Challenge 64 report April 1, 2014

Add to Reading List

Source URL: www.matousec.com

Language: English - Date: 2014-04-01 12:50:29
950Electronic engineering / Software testing / Electronics / Computer network security / Technology / Broadband / Videotelephony / Voice over IP

Introduction Having Fun/Demo Fuzzing

Add to Reading List

Source URL: www.shmoocon.org

Language: English - Date: 2010-11-01 16:47:09
UPDATE