Vulnerability database

Results: 242



#Item
51This discussion paper is/has been under review for the journal Natural Hazards and Earth System Sciences (NHESS). Please refer to the corresponding final paper in NHESS if available. Discussion Paper  Nat. Hazards Earth

This discussion paper is/has been under review for the journal Natural Hazards and Earth System Sciences (NHESS). Please refer to the corresponding final paper in NHESS if available. Discussion Paper Nat. Hazards Earth

Add to Reading List

Source URL: www.nat-hazards-earth-syst-sci-discuss.net

Language: English - Date: 2015-02-24 02:56:15
52The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

The SQL Injection Threat Study Sponsored by DB Networks Independently conducted by Ponemon Institute LLC Publication Date: April[removed]Ponemon Institute© Research Report

Add to Reading List

Source URL: www.dbnetworks.com

Language: English - Date: 2014-04-15 01:06:32
53OVAL Board MinutesAttendees Jonathan Baker – MITRE Andrew Buttner – MITRE Bryan Worrell – MITRE

OVAL Board MinutesAttendees Jonathan Baker – MITRE Andrew Buttner – MITRE Bryan Worrell – MITRE

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2008-09-03 10:58:13
54Value of Cloud Security: Vulnerability Leviathan Security Group limitless innovation. no compromise.  Introduction

Value of Cloud Security: Vulnerability Leviathan Security Group limitless innovation. no compromise. Introduction

Add to Reading List

Source URL: www.leviathansecurity.com

Language: English - Date: 2015-02-10 17:05:02
55Oracle_Security_Basics_UKOUG_2008

Oracle_Security_Basics_UKOUG_2008

Add to Reading List

Source URL: www.petefinnigan.com

Language: English - Date: 2008-12-12 07:06:21
56Shell Employee Directory Leaked, Allegedly By Activist Wor...  http://www.darkreading.com/database_security/security/client... Eight Steps To Holistic Database Security

Shell Employee Directory Leaked, Allegedly By Activist Wor... http://www.darkreading.com/database_security/security/client... Eight Steps To Holistic Database Security

Add to Reading List

Source URL: www.shellnews.net

Language: English - Date: 2010-02-13 10:54:23
57TOP 10 where Security-OBLIGATED Executives should focus Introduction

TOP 10 where Security-OBLIGATED Executives should focus Introduction

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-21 02:20:33
58Building a Database Security Program Despite being our most important repositories for our most sensitive - and critical - data, the ongoing, multi-year spate of data breaches shows most organizations still struggle to e

Building a Database Security Program Despite being our most important repositories for our most sensitive - and critical - data, the ongoing, multi-year spate of data breaches shows most organizations still struggle to e

Add to Reading List

Source URL: securosis.com

Language: English - Date: 2011-12-01 09:44:11
59PROJECT COMPONENTS Component 1: Vulnerability assessment and risk reduction strategies for existing protected area systems The extent to which the PAs in the West African region have been affected or could be affected by

PROJECT COMPONENTS Component 1: Vulnerability assessment and risk reduction strategies for existing protected area systems The extent to which the PAs in the West African region have been affected or could be affected by

Add to Reading List

Source URL: ec2-54-80-210-23.compute-1.amazonaws.com

Language: English - Date: 2014-01-10 05:57:49
60Date: [removed]Case Study: PENETRATION TESTING AUDIT Preface: Penetration testing AKA pen-testing is a process where a tester looks for exploitable vulnerabilities from within an IT infrastructure that may allow the t

Date: [removed]Case Study: PENETRATION TESTING AUDIT Preface: Penetration testing AKA pen-testing is a process where a tester looks for exploitable vulnerabilities from within an IT infrastructure that may allow the t

Add to Reading List

Source URL: 2secure.biz

Language: English - Date: 2015-01-01 11:45:50