Zero-day

Results: 689



#Item
211Hacking / War / Advanced persistent threat / Military technology / Securitate / Malware / Computer insecurity / Zero-day attack / Security / Cyberwarfare / Electronic warfare

Atacuri avansate impotriva institutiilor financiare Metode de prevenire si raspuns Teodor Cimpoesu, Cyber Security BU Director Cyber Risks, Bucuresti, 9 Oct, 2014

Add to Reading List

Source URL: cyberisks.ro

Language: English - Date: 2014-10-10 03:40:58
212Failure / Hacking / Software testing / Vulnerability / Cross-site scripting / SQL injection / CVSS / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Microsoft Word - vuln2010q3-e.doc

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-05-28 22:03:35
213Sweden / Council of the Baltic Sea States / Europe / Baltic Sea / HELCOM

ZERO VISION TOOL for a more safe, environmentally and energy efficient as well as profitable transport by sea The method and experiences May 21, 2015 – Åland Maritime Day

Add to Reading List

Source URL: www.sjofart.ax

Language: English - Date: 2015-05-22 05:47:29
214Security / Software testing / Hacking / Vulnerability / Software quality / Zero-day attack / Software assurance / Software bug / Patch / Computer network security / Cyberwarfare / Computer security

문서의 제목 나눔고딕B, 54pt

Add to Reading List

Source URL: www.commoncriteriaportal.org

Language: English - Date: 2013-09-12 12:11:16
215Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:16
216Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: www.prevoty.com

Language: English - Date: 2015-06-04 23:45:14
217Computer security / Zero-day attack / Computing / Computer network security / Codenomicon / Security

Codenomicon-AppCheck-Symbol-Lock

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2015-06-08 10:21:10
218Computing / Software testing / Software engineering / Application security / Electronic commerce / Cross-site scripting / Vulnerability / Penetration test / Zero-day attack / Cyberwarfare / Computer security / Computer network security

Improving your Secure SDLC ( SSDLC ) with Prevoty How adding real-time application security dramatically decreases vulnerabilities February 2015

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:14
219Security / Software testing / Crime prevention / National security / Application firewall / Application security / Penetration test / Zero-day attack / Cross-site scripting / Computer network security / Cyberwarfare / Computer security

THE EVOLUTION OF ENTERPRISE APPLICATION SECURITY April 2015 THE EVOLUTION

Add to Reading List

Source URL: prevoty.com

Language: English - Date: 2015-06-04 23:45:16
220Sustainable building / Roofs / Landscape architecture / Sustainable architecture / Sustainable gardening / Green roof / Steven W. Peck / LEED Professional Exams / Urban heat island / Architecture / Environmental design / Environment

PRELIMINARY CONFERENCE AGENDA Updated: May 11, 2015 SUNDAY, OCTOBER 4 8:30 am – 5:00 pm Net Zero Water Boot Camp (Day One) (Ticketed Event)

Add to Reading List

Source URL: greenroofs.org

Language: English - Date: 2015-05-11 16:33:04
UPDATE