Vulnerability

Results: 14773



#Item
911Software testing / Lint / Programming tool / Vulnerability

Beyond Patch and Pray: Security by Design • Adam Shostack • Presented to the Security Leadership Conference Series

Add to Reading List

Source URL: adam.shostack.org

Language: English - Date: 2014-06-11 11:47:33
912Water / Environmental science / Liquid water / Safe Drinking Water Act / Groundwater / Water quality / Iowa Department of Natural Resources / Drinking water / Pesticide / Arsenic / Water testing / Groundwater pollution

2013 SURVEY OF IOWA GROUNDWATER and Evaluation of Public Well Vulnerability Classifications for Contaminants of Emerging Concern Iowa Geological and Water Survey Technical Information Series 57

Add to Reading List

Source URL: s-iihr34.iihr.uiowa.edu

Language: English - Date: 2015-06-23 12:14:38
913

31st IEEE Symposium on Security & Privacy TaintScope: A Checksum-Aware Directed Fuzzing Tool for Automatic Software Vulnerability Detection 1

Add to Reading List

Source URL: faculty.cs.tamu.edu

Language: English - Date: 2011-06-14 14:11:41
    914

    ABC NEWS/WASHINGTON POST POLL: 2016 Politics EMBARGOED FOR RELEASE AFTER 5 p.m. Monday, July 20, 2015 Trump Gains Yet Shows Vulnerability in a Crowded, Contentious GOP Race Controversial Republican presidential candidate

    Add to Reading List

    Source URL: www.langerresearch.com

    Language: English - Date: 2015-07-20 16:44:30
      915

      Vulnerability Index - Service Prioritization Decision Assistance Tool (VI-SPDAT) Prescreen Triage Tool for Famlies Formatted for use in Seattle/King CountyBased on VI-SPDAT 2.0 developed by OrgCode Consulting

      Add to Reading List

      Source URL: mayorschallengeseakc.files.wordpress.com

      Language: English - Date: 2015-09-01 12:51:32
        916

        Entropy: Alternative notions As we argued before, there is no unique notion of vulnerability. It depends on: • •

        Add to Reading List

        Source URL: www.lix.polytechnique.fr

        Language: English - Date: 2015-03-11 06:04:34
          917

          A Vulnerability and Risk Assessment of SEPTA’s Regional Rail A Transit Climate Change Adaptation Assessment Pilot AUGUST 2013 FTA Report No. 0071

          Add to Reading List

          Source URL: septa.org

          Language: English - Date: 2015-10-02 10:31:17
            918Cyberwarfare / Computing / Computer security / Software maintenance / Software release / Patch / Computer network security / Vulnerability / Common Vulnerabilities and Exposures / Transdermal patch / Computer worm / Shavlik Technologies

            Timing the Application of Security Patches for Optimal Uptime Steve Beattie, Seth Arnold, Crispin Cowan, Perry Wagle, and Chris Wright † – WireX Communications, Inc. Adam Shostack – Zero Knowledge Systems, Inc. ABS

            Add to Reading List

            Source URL: adam.shostack.org

            Language: English - Date: 2014-06-11 11:42:33
            919

            IS YOUR WEBSITE HACKABLE? Check with Acunetix Web Vulnerability Scanner Audit your Website Security with Acunetix Web Vulnerability Scanner

            Add to Reading List

            Source URL: www.saberion.com

            Language: English - Date: 2014-07-08 02:34:49
              920Cyberwarfare / Computer security / Computing / Computer network security / Hacking / Software testing / Software bugs / Vulnerability / Heartbleed / Zero-day / Cross-site scripting / Security testing

              Website Security Statistics Report 2015 About This Report WhiteHat Security’s Website Security Statistics

              Add to Reading List

              Source URL: info.whitehatsec.com

              Language: English - Date: 2016-02-25 05:35:53
              UPDATE