Vulnerability

Results: 14773



#Item
951Computing / Computer security / Cyberwarfare / Hacking / Software testing / Vulnerability / SQL injection / Transport Layer Security / Dynamic SSL

http://www.sektioneins.de Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-02-06 15:51:10
952Computing / Cyberwarfare / Software engineering / Hacking / Software testing / SQL / Computer security / Data management / SQL injection / Vulnerability / Data-flow analysis / Denial-of-service attack

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
953Military of Norway / Royal Norwegian Navy / Royal Navy / Coast guard / Northwood Headquarters / Piracy

2nd International Conference on Waterside Security 3-5 November 2010, Marina di Carrara, Italy Reducing Vulnerability Through Multi-National Collaboration. Plenary Session: Wednesday, 3 Nov 2010, 09:50 , Michelangelo Roo

Add to Reading List

Source URL: www.wss2010.org

Language: English - Date: 2010-10-07 04:49:59
954Atmospheric sciences / Meteorology / Risk / Heat wave / Torridness / Extreme weather / Urban heat island / Air pollution / Hazard / Tropical cyclone / Social vulnerability / Hurricane Sandy

New York City Panel on Climate Change 2015 ReportChapter 5: Public Health Impacts and Resiliency

Add to Reading List

Source URL: www.theworldisyourocean.net

Language: English - Date: 2015-04-21 12:36:27
955Security / Prevention / Computer security / Computer network security / Data security / Cryptography / Information security / Threat / Managed security service / Risk management / Asset / Vulnerability

In Brief WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2015-07-14 05:58:47
956Christian clothing / Clothing / Mitre Corporation / Open Vulnerability and Assessment Language / Business / Mitre / Center for Internet Security / Intel

OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Kent Landfield – Intel Corporation Steven Piliero – Unified Compliance

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2015-07-09 13:27:05
957Security / Prevention / Computer security / National security / Crime prevention / Cryptography / Information governance / Vulnerability / Information security / Bromium / Cyber-attack / Attack

Report Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Add to Reading List

Source URL: www.bromium.com

Language: English
958

Model-Based Vulnerability Testing for Web Applications Franck Lebeau∗ , Bruno Legeard∗† , Fabien Peureux∗ and Alexandre Vernotte∗ ∗ FEMTO-ST Institute - DISC department - UMR CNRS 6174

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-03-01 18:57:54
    959Risk / Vulnerability / Security / Emergency management / Earthquake engineering / Social vulnerability / Natural hazard / Disaster / Flood / Hayward Fault Zone / Hazard / Seismic hazard

    Housing and Community Risk Multiple Hazard Risk Assessment Dana Brechwald, Resilience Planner, ABAG Cynthia Kroll, Chief Economist and Primary

    Add to Reading List

    Source URL: resilience.abag.ca.gov

    Language: English - Date: 2015-03-12 15:22:33
    960Computing / Software testing / Computer security / Security / Codenomicon / Vulnerability / Fuzz testing / Wi-Fi / Transport Layer Security / Bluetooth / Vulnerability management

    Defensics Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:12
    UPDATE