Vulnerability

Results: 14773



#Item
831

2016 IEEE Symposium on Security and Privacy LAVA: Large-scale Automated Vulnerability Addition Brendan Dolan-Gavitt∗ , Patrick Hulin† , Engin Kirda‡ , Tim Leek† , Andrea Mambretti‡ , Wil Robertson‡ , Frederi

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2016-04-21 14:48:12
    832Anti-satellite weapon / Satellites / Version control / Package manager / Configuration file / Software quality / Test automation / Open Vulnerability and Assessment Language

    Analyzing the State of Static Analysis: A Large-Scale Evaluation in Open Source Software Moritz Beller, Radjino Bholanath Shane McIntosh

    Add to Reading List

    Source URL: www.st.ewi.tudelft.nl

    Language: English - Date: 2016-01-25 13:26:47
    833Security / Prevention / Safety / Vulnerability / Computer network security / Hacking / Software testing / Computer security / Patch / Social vulnerability

    Leoni Veranstaltung

    Add to Reading List

    Source URL: www.greenbone.net

    Language: English - Date: 2016-06-16 08:24:26
    834

    Introduction Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license. ■ http://creativecommons.org/licenses/by-sa/3.0/

    Add to Reading List

    Source URL: www.opensecuritytraining.info

    Language: English - Date: 2013-11-03 14:53:39
      835Data security / Computer security / Security / Computer network security / Cryptography / Information security management system / IT risk management / Information security / ISO/IEC 27001:2013 / Vulnerability / Security controls / Risk management

      POLICY think project! INFORMATION SECURITY MANAGEMENT SYSTEM INFORMATION SECURITY POLICY

      Add to Reading List

      Source URL: www.thinkproject.com

      Language: English - Date: 2015-03-17 10:50:21
      836

      ERA-NET Neuron NEWSLETTER 20 VGLUT3 and vulnerability to addiction (COCACE) Project Coordinator: Prof. Salah El Mestikawy, Douglas hospital, McGill University, Montréal, Canada.

      Add to Reading List

      Source URL: www.neuron-eranet.eu

      Language: English - Date: 2014-08-21 10:52:12
        837Labour economics / Monterrey Institute of Technology and Higher Education / Poverty / Unemployment / Economy / International relations / Economics

        Abstract for “Labor Vulnerability and the Evolution of the Working Poor in Mexico” Eduardo Rodríguez-Oreggia (EGAP, Tecnológico de Monterrey) Bruno López-Videla (EGAP, Tecnológico de Monterrey) Daniel Prudencio (

        Add to Reading List

        Source URL: www.iariw.org

        Language: English - Date: 2013-05-24 14:20:27
        838

        Vulnerability Assessment Tools Vulnerability Assessment Course All materials are licensed under a Creative Commons Share Alike license.

        Add to Reading List

        Source URL: www.opensecuritytraining.info

        Language: English - Date: 2013-11-03 14:53:45
          839Security / Computer security / Computing / Software testing / Computer network security / Hacking / Cryptography / White hat / Vulnerability / Security testing / Security hacker / Penetration test

          PENetration TESTING & ETHICAL HACKING SERVICES Are Your Information Security Measures Effective?

          Add to Reading List

          Source URL: www.redscan.com

          Language: English - Date: 2016-03-21 10:47:46
          840

          Fostering cooperation through the enhancement of own vulnerability Anita Kop´anyi-Peuker, Theo Offerman and Randolph Sloof∗ November 27, 2012 Abstract

          Add to Reading List

          Source URL: www1.feb.uva.nl

          Language: English - Date: 2012-12-03 10:19:12
            UPDATE