Vulnerability assessment

Results: 2199



#Item
131Software / Computing / Computer security / Computer network security / Software testing / Penetration test / Application security / Vulnerability assessment / W3af / Security testing / Metasploit Project / Vulnerability

International Journal of Network Security & Its Applications (IJNSA), Vol.3, No.6, NovemberAN OVERVIEW OF PENETRATION TESTING 1 Aileen G. Bacudio, 1Xiaohong Yuan, 2Bei-Tseng Bill Chu, 1Monique Jones

Add to Reading List

Source URL: airccse.org

Language: English - Date: 2011-11-30 01:55:07
132

Analysis and recommendations for standardization in penetration testing and vulnerability assessment Penetration testing market survey William Knowles, Alistair Baron and Tim McGarr

Add to Reading List

Source URL: shop.bsigroup.com

Language: English - Date: 2015-05-28 05:47:44
    133

    Vulnerability Assessment maps for communities in Northern Ghana Evapotranspiration to the doorsteps of the farmer - A case of Kokoligu Community in the Upper Region, Ghana Project Partners

    Add to Reading List

    Source URL: greenwaterhut.org

    Language: English - Date: 2015-03-03 14:05:36
      134

      Web Application Vulnerability Assessment Discovering and Mitigating Vulnerabilities in Web Applications 14 Octoberhack.luWeb Application Vulnerability Assessment / Kris Philipsen

      Add to Reading List

      Source URL: archive.hack.lu

      Language: English - Date: 2005-10-20 15:29:18
        135

        Vulnerability Assessment Project Overview

        Add to Reading List

        Source URL: www.cambridgema.gov

        Language: English - Date: 2013-01-11 10:53:23
          136Computer security / Computing / Security / Security Content Automation Protocol / Mitre Corporation / Computer network security / National security / Software quality / Extensible Configuration Checklist Description Format / Common Vulnerabilities and Exposures / Vulnerability / Open Vulnerability and Assessment Language

          Standards in reporting Software Flaws: SCAP, CVE and CWE Robin A. Gandhi, Ph.D. University of Nebraska at Omaha (UNO) College of Information Science and Technology (IS&T) School of Interdisciplinary Informatics (Si2)

          Add to Reading List

          Source URL: www.nebraskacert.org

          Language: English - Date: 2010-05-19 17:57:00
          137

          Capital Area Council of Governments (CAPCOG) Request for Proposals for Capital Area Regional Cyber-attack Vulnerability Assessment and Planning Responses to Questions from Potential Vendors

          Add to Reading List

          Source URL: www.capcog.org

          Language: English - Date: 2015-06-03 17:33:06
            138

            Vulnerability Advisory Name Vendor Website Date Released Affected Software Researcher

            Add to Reading List

            Source URL: www.security-assessment.com

            Language: English - Date: 2011-11-28 21:14:34
              139

              Climate Change Vulnerability Assessment Public Meeting MarchCambridge Massachusetts

              Add to Reading List

              Source URL: www.cambridgema.gov

              Language: English - Date: 2015-03-23 17:12:51
                140Earth / Effects of global warming / Vulnerability / Social vulnerability / Flood / IPCC Third Assessment Report / Current sea level rise / Risk / Atmospheric sciences / Meteorology

                Climate vulnerability assessment for urban area in the Netherlands Frans van de Ven, Chris Zevenbergen, Leendert van Bree Deltares / TU Delft, UNESCO-IHE and Netherlands Environmental Assessment Agency

                Add to Reading List

                Source URL: eccaconf.eu

                Language: English - Date: 2013-05-24 05:04:49
                UPDATE