Security testing

Results: 3214



#Item
971Security / Software testing / Crime prevention / National security / Vulnerability / Attack / Threat / Countermeasure / Penetration test / Computer network security / Cyberwarfare / Computer security

2-3 A Development of Experimental Environments “SIOS” and “VM Nebula” for Reproducing Internet Security Incidents MIWA Shinsuke and OHNO Hiroyuki Security incidents are growing significantly on a daily basis in t

Add to Reading List

Source URL: www.nict.go.jp

Language: English - Date: 2013-11-21 18:55:47
972Security / Crime prevention / National security / Privacy / Surveillance / Conformity assessment / Accreditation / Public safety / Evaluation methods / Quality assurance / Ethics

Policy Circular 46 – December 2014 Issued: April 2013 Amended and reissued: December 2014 Introduction of new NATA/RCPA accreditation surveillance model for Medical Testing

Add to Reading List

Source URL: www.nata.com.au

Language: English - Date: 2014-11-30 18:04:52
973Gas Safety (Installation and Use) Regulations / United Kingdom / Prevention / Security / Electrical engineering / Test and tagging / Portable appliance testing / Safety / Electrical safety / Electrical wiring

Legislative Council Panel on Economic Services Approval of Domestic Gas Appliances INTRODUCTION This paper informs Members of the Administration’s plan to require all new domestic gas appliances manufactured or importe

Add to Reading List

Source URL: www.legco.gov.hk

Language: English - Date: 2005-11-03 01:22:22
974Reliability engineering / Server / Ring / Systems engineering / Systems science / Engineering / Software testing / Fault injection / Emulator

Software Self-Healing Using Collaborative Application Communities Michael E. Locasto, Stelios Sidiroglou, and Angelos D. Keromytis Network Security Lab, Department of Computer Science, Columbia University {locasto, steli

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2006-02-09 00:38:32
975International relations / Breastfeeding / Wasting / Food security / Bangladesh / Political geography / International Centre for Diarrhoeal Disease Research /  Bangladesh / Behavior

Development and Acceptability Testing of Ready-to-Use-Supplementary Food (RUSF) for children in Bangladesh Dr M Munirul Islam, MBBS, PhD Scientist, Centre for Nutrition & Food Security and

Add to Reading List

Source URL: www-naweb.iaea.org

Language: English - Date: 2014-06-03 09:51:05
976Software testing / Computing / Database security / Database / Vulnerability / Information security management system / Systems engineering process / Information security / Certified Information Technology Professional / Data security / Computer security / Security

Building a Database Security Program Despite being our most important repositories for our most sensitive - and critical - data, the ongoing, multi-year spate of data breaches shows most organizations still struggle to e

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:11
977Software testing / Hacking / Cross-platform software / Vulnerability / Debian / Capability-based security / Requirement / Common Vulnerabilities and Exposures / Computer security / Software / Cyberwarfare

Requirements and Recommendations for CVE Compatibility This is a draft report and does not represent an official position of The MITRE Corporation. © 2013, The MITRE Corporation. All rights reserved. Permission is grant

Add to Reading List

Source URL: www.cve.mitre.org

Language: English - Date: 2013-07-10 15:37:57
978Quality assurance / Fuzz testing / Codenomicon / Black-box testing / Vulnerability management / Vulnerability / Gray box testing / Oracle / Test automation / Software testing / Computer security / Software quality

What is Fuzzing: The Poet, the Courier, and the Oracle Fuzzing is well established as an excellent technique for locating vulnerabilities in software. The basic premise is to deliver intentionally malformed input to targ

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-04-01 19:53:30
979Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
980Computer network security / Software testing / Electronic commerce / Data security / Penetration test / McAfee / Vulnerability / Application security / Threat model / Computer security / Security / Cyberwarfare

Data Sheet McAfee Foundstone Professional Services Strategic Security Solutions McAfee® Foundstone® Professional Services balances the strategic benefits of business consulting with a tactical, hands-on approach to te

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2015-01-19 18:16:17
UPDATE