Vulnerability database

Results: 242



#Item
31

PDF Document

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
32

PDF Document

Add to Reading List

Source URL: www.security-assessment.com

Language: English - Date: 2013-11-12 17:02:34
33The CLIMSAVE Project Climate Change Integrated Assessment Methodology for Cross-Sectoral Adaptation and Vulnerability in Europe  Report on the European driving force database

The CLIMSAVE Project Climate Change Integrated Assessment Methodology for Cross-Sectoral Adaptation and Vulnerability in Europe Report on the European driving force database

Add to Reading List

Source URL: www.climsave.eu

Language: English - Date: 2013-02-07 15:33:08
34Data Sheet  McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Data Sheet McAfee Vulnerability Manager for Databases A comprehensive assessment of the risk to your most sensitive data You store your most valuable and sensitive data in a database, but most vulnerability

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 00:53:28
35THIRD PARTY REVIEW Department of Central Management Services Bureau of Communication and Computer Services July 2007

THIRD PARTY REVIEW Department of Central Management Services Bureau of Communication and Computer Services July 2007

Add to Reading List

Source URL: www.auditor.illinois.gov

Language: English - Date: 2007-08-06 10:29:00
36Technology Blueprint  Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time

Technology Blueprint Assess Your Vulnerabilities Maintain a continuous understanding of assets and manage vulnerabilities in real time

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 03:13:42
37SOFTWARE VULNERABILITY ANALYSIS  A Thesis Submitted to the Faculty of Purdue University

SOFTWARE VULNERABILITY ANALYSIS A Thesis Submitted to the Faculty of Purdue University

Add to Reading List

Source URL: www.dbnet.ece.ntua.gr

Language: English - Date: 2001-12-12 02:52:38
38Case Study: Web Application & Database Security Audit (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Case Study: Web Application & Database Security Audit (Document NoSolutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:47
39Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Improving Application Security with Data Flow Assertions Alexander Yip, Xi Wang, Nickolai Zeldovich, and M. Frans Kaashoek Massachusetts Institute of Technology – Computer Science and Artificial Intelligence Laboratory

Add to Reading List

Source URL: pdos.csail.mit.edu

Language: English - Date: 2009-08-18 12:06:49
40Case Study: Medical Council Website Security Audit Solutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services 151 Kalmus Drive, Suite L-4 Costa Mesa, CA 92626

Case Study: Medical Council Website Security Audit Solutions For Advanced IT Services Altius Information Technologies, Inc. Dedicated to the advancement of IT services 151 Kalmus Drive, Suite L-4 Costa Mesa, CA 92626

Add to Reading List

Source URL: www.altiusit.com

Language: English - Date: 2015-01-29 19:02:40