Vulnerability

Results: 14773



#Item
821Computer security / Cyberwarfare / Computing / Hacking / Computer network security / Software testing / Vulnerability / CERT Coordination Center / Cross-site scripting / SQL injection / CVSS / Benjamin Kunz Mejri

Reporting Status of Vulnerability-related Information about Software Products and Websites - 1st Quarter ofJanuary – March) - Information-technology Promotion Agency, Japan (IPA) and Japan Computer Emergency Res

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2016-05-31 02:00:13
822Hacking / Computer network security / Computer security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

Add to Reading List

Source URL: www.veracode.com

Language: English - Date: 2016-01-20 16:34:29
823Security / Computing / Computer security / Prevention / Cyberwarfare / Computer network security / Cryptography / National security / Bug bounty program / Vulnerability / Lavasoft / Application security

EVAN RICAFORT Address: Prk. Orchids, Poblacion, Ipil Zamboanga Sibugay, Zamboanga Del Sur 7000 | Email: | Mobile: + | Website: www.evanricafort.com SUMMARY

Add to Reading List

Source URL: evanricafort.com

Language: English - Date: 2016-01-21 13:11:11
824Causality / Conditionals / Philosophy of science / Carnegie Mellon University / Email / Communications protocol / Vulnerability

Actual Causes of Security Violations (Extended Abstract) Anupam Datta Dilsun Kaynar Divya Sharma Arunesh Sinha Carnegie Mellon University Carnegie Mellon University Carnegie Mellon University Carnegie Mellon University

Add to Reading List

Source URL: software.imdea.org

Language: English
825Computing / Software / Cyberspace / Spamming / Social networking services / Computer network security / Cybercrime / E-commerce / Twitter / Vulnerability / Computer security / Botnet

A Categorization Scheme for Socialbot Attacks In Online Social Networks Silvia Mitter Knowledge Technologies Institute Graz University of Technology, Austria

Add to Reading List

Source URL: claudiawagner.info

Language: English - Date: 2013-08-25 09:03:46
826

Security Best Practices Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

Add to Reading List

Source URL: www.opensecuritytraining.info

Language: English - Date: 2013-11-03 14:54:10
    827

    Evolutionary Applications ISSNPERSPECTIVE Ten questions for evolutionary studies of disease vulnerability

    Add to Reading List

    Source URL: www2.unb.ca

    Language: English - Date: 2011-11-10 20:59:32
      828Prevention / Cultural globalization / Motivation / Psychological resilience / Peacebuilding / Safety / Ecological resilience / Resilience / Social vulnerability / Center for Justice and Peacebuilding

      RESILIENCE-BASED DEVELOPMENT PAX 580 SPI 2016 Session 1; May:30 a.m. to 5:00 p.m.

      Add to Reading List

      Source URL: www.emu.edu

      Language: English - Date: 2016-05-23 14:53:56
      829

      Online risk, harm and vulnerability: Reflections on the evidence base for child Internet safety policy Internet darabilten adingabekoen segurtasun politikarako informazioaren inguruko gogoetak Riesgos, daños y vulnerabi

      Add to Reading List

      Source URL: www.ehu.eus

      Language: English - Date: 2013-11-29 10:20:21
        830

        Independent Joint Anti-Corruption Monitoring and Evaluation Committee Vulnerability to Corruption Assessment (VCA) of the International Work Permit Process Kabul

        Add to Reading List

        Source URL: www.mec.af

        Language: English - Date: 2016-05-29 00:50:24
          UPDATE