Vulnerability

Results: 14773



#Item
841Software testing / Pharmaceutical industry / Validity / Software verification / Verification and validation / Validation / European Joint Conferences on Theory and Practice of Software / Data validation / Vulnerability

UNIVERSITY OF CALIFORNIA Santa Barbara Automatic Detection and Repair of Input Validation and Sanitization Bugs A Dissertation submitted in partial satisfaction

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2014-07-17 15:02:57
842Computer security / Security / Computer network security / Computing / Crime prevention / Cryptography / National security / Vulnerability / OpenVAS / Attack / Countermeasure / Security appliance

Turn-key Vulnerability Management Greenbone Security Manager The solution for IT security in your organisation

Add to Reading List

Source URL: www.greenbone.net

Language: English - Date: 2016-06-15 04:15:49
843

ADEQ System Evaluations Fann Environmental has been a consultant to ADEQ since 2005 to provide small and rural water system with system evaluations, vulnerability assessments, develop operation and maintenance manuals a

Add to Reading List

Source URL: www.fannenvironmental.com

Language: English - Date: 2012-12-30 16:39:09
    844Software / Computing / Mozilla / Web browsers / Hacking / News aggregators / Firefox / JavaScript / Vulnerability / NoScript / Browser extension / XPCOM

    CrossFire: An Analysis of Firefox Extension-Reuse Vulnerabilities Ahmet Salih Buyukkayhan Kaan Onarlioglu

    Add to Reading List

    Source URL: www.internetsociety.org

    Language: English - Date: 2016-02-22 09:41:20
    845Computing / Java platform / Java / Cross-platform software / Computing platforms / C++ / Java virtual machine / Java applet / Oracle Database / Namespace / Include directive / Java version history

    Security Vulnerability Notice SEORACLE-14 [Security vulnerabilities in Java SE, Issue 69#2] DISCLAIMER INFORMATION PROVIDED IN THIS DOCUMENT IS PROVIDED "AS IS" WITHOUT

    Add to Reading List

    Source URL: www.security-explorations.com

    Language: English - Date: 2016-03-10 01:27:46
    846Computer network security / Hacking / Software testing / Vulnerability / Computer security

    Side Channel Vulnerabilities on the Web - Detection and Prevention Sebastian Schinzel Virtual Forge GmbH

    Add to Reading List

    Source URL: www.nds.rub.de

    Language: English - Date: 2010-11-30 18:42:34
    847Security / Cyberwarfare / Computer security / National security / Crime prevention / Computer network security / Hacking / Malware / Vulnerability / Kill chain / Mobile malware / Mobile security

    Mobile Exploit Intelligence Project   Dan  Guido,  Trail  of  Bits   Mike  Arpaia,  iSEC  Partners     Blackberry,    

    Add to Reading List

    Source URL: www.trailofbits.com

    Language: English - Date: 2016-04-15 11:36:17
    848Computer network security / Computer security / Software testing / OpenVAS / Nessus / Penetration test / Hacking / Nmap / Vulnerability / Application firewall

    Jordan Wright Permanent Address: 5903 Babcock Rd. AptSan Antonio, TXContact: jordan-wright.github.io

    Add to Reading List

    Source URL: jordan-wright.com

    Language: English - Date: 2016-04-10 15:44:49
    849Computing / Cyberwarfare / Computer security / Computer network security / Cybercrime / Spamming / Social engineering / Botnet / Web threat / Malware / Vulnerability / Computer virus

    Fighting the ‘Good’ Internet War Dan Cvrˇcek† and George Danezis 1 University of Cambridge, UK & Brno University of Technology, CZ. 2

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:48:56
    850Computer security / Security / Data security / IT risk management / Risk analysis / BeyondTrust / Vulnerability / Threat / IT risk / Risk management / Asset

    BeyondTrust Corporate Overview The leader in preventing data breaches from insider privilege abuse and external hacking attacks Reducing IT security risk with unmatched visibility and control The majority of data breache

    Add to Reading List

    Source URL: www.ciosummits.com

    Language: English - Date: 2016-02-10 11:33:29
    UPDATE