Vulnerability database

Results: 242



#Item
11Software / Computing / Cyberwarfare / Computer network security / Computer security / Warez / Zero-day / Vulnerability database / Vulnerability / Common Vulnerabilities and Exposures / NetBSD / Solaris

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-04-15 13:02:34
12Computer security / Computer network security / Vulnerability / Software testing / Vulnerability database / National Vulnerability Database / Zero-day / CVSS / Common Vulnerabilities and Exposures / Attack / Buffer overflow / Social vulnerability

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
13Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
14Relational database management systems / Computer network security / Database management systems / Hacking / Software testing / SQL injection / Cross-site scripting / Vulnerability / Code injection / Computing / Cyberwarfare / Computer security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-09 23:13:11
15Cross-platform software / Computer security / Code injection / Machine code / Malware / Vulnerability scanner / Nmap / National Vulnerability Database / Ping / Software / Computing / System software

Basic Web Security About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

Add to Reading List

Source URL: ton.packetlove.com

Language: English
16Software testing / Hacking / Relational database management systems / Database management systems / Attack patterns / SQL injection / Vulnerability / Code injection / Buffer overflow / Cyberwarfare / Computing / Computer security

CWECWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
17Actuarial science / Ethics / Disaster preparedness / Emergency management / Security / Social vulnerability / Database / Centre for Research on the Epidemiology of Disasters / Disaster / Management / Public safety / Risk

Disaster Loss Data (DATA Working Group) Introduction The disaster data landscape is complex and the community that is dealing with loss data is a rapidly growing one. When human, monetary or environmental losses occur as

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2013-05-16 01:13:49
18Actuarial science / Ethics / Disaster preparedness / Emergency management / Security / Social vulnerability / Database / Centre for Research on the Epidemiology of Disasters / Disaster / Management / Public safety / Risk

Disaster Loss Data (DATA Working Group) Introduction The disaster data landscape is complex and the community that is dealing with loss data is a rapidly growing one. When human, monetary or environmental losses occur as

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2013-05-16 01:00:05
19Computer network security / Data security / Content-control software / Fortinet / Database security / Database activity monitoring / Security information and event management / Vulnerability / Database / Computing / Computer security / Cyberwarfare

DATA SHEET FortiDB™ Database Security and Compliance FortiDB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:06
20Computer security / Crime prevention / National security / Database security / Application security / Vulnerability / Network security / Information security audit / CompTIA / Security / Cyberwarfare / Computer network security

Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:25:48
UPDATE