Vulnerability database

Results: 242



#Item
11OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

OS Diversity for Intrusion Tolerance: Myth or Reality? Miguel Garcia∗ , Alysson Bessani∗ , Ilir Gashi† , Nuno Neves∗ and Rafael Obelheiro‡ ∗ LaSIGE, University of Lisbon, Faculty of Sciences – Lisbon, Portu

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2011-04-15 13:02:34
12SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

SOFTWARE – PRACTICE AND EXPERIENCE Softw. Pract. ExperPublished online in Wiley Online Library (wileyonlinelibrary.com). DOI: spe.2180 Analysis of operating system diversity for intrusion tolerance Mig

Add to Reading List

Source URL: www.di.fc.ul.pt

Language: English - Date: 2013-01-18 09:24:08
13=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
14How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

How to Secure Your Website 5th Edition Approaches to Improve Web Application and Website Security

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2013-07-09 23:13:11
15Basic Web Security  About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

Basic Web Security About Me • Working with Web Developer Since 1996
 • Working with Unix (FreeBSD, Linux) System Admin Since 1996

Add to Reading List

Source URL: ton.packetlove.com

Language: English
16CWECWE/SANS Top 25 Most Dangerous Software Errors

CWECWE/SANS Top 25 Most Dangerous Software Errors

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2012-09-25 15:14:33
17Disaster Loss Data (DATA Working Group) Introduction The disaster data landscape is complex and the community that is dealing with loss data is a rapidly growing one. When human, monetary or environmental losses occur as

Disaster Loss Data (DATA Working Group) Introduction The disaster data landscape is complex and the community that is dealing with loss data is a rapidly growing one. When human, monetary or environmental losses occur as

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2013-05-16 01:13:49
18Disaster Loss Data (DATA Working Group) Introduction The disaster data landscape is complex and the community that is dealing with loss data is a rapidly growing one. When human, monetary or environmental losses occur as

Disaster Loss Data (DATA Working Group) Introduction The disaster data landscape is complex and the community that is dealing with loss data is a rapidly growing one. When human, monetary or environmental losses occur as

Add to Reading List

Source URL: www.preventionweb.net

Language: English - Date: 2013-05-16 01:00:05
19DATA SHEET  FortiDB™ Database Security and Compliance  FortiDB

DATA SHEET FortiDB™ Database Security and Compliance FortiDB

Add to Reading List

Source URL: www.corex.at

Language: English - Date: 2015-05-13 12:15:06
20Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Security Engineer Location: Burlington, VT or Denver, CO or Boston, MA or Washington DC Term: Permanent Travel Required: Yes – up to 50% Telecommute: Occasionally

Add to Reading List

Source URL: www.nuharborsecurity.com

Language: English - Date: 2015-05-04 21:25:48