Codenomicon

Results: 114



#Item
61Cyberwarfare / Computer security / Codenomicon / Oulu University Secure Programming Group / Tekes / Vulnerability / Information security / Copyright / Innovation / Software testing / Computer network security / Security

Commercializing Security Technnologies Suvi Sundquist The Finnish Funding Agency for Technology and Innovation - Tekes Copyright © Tekes

Add to Reading List

Source URL: ec.europa.eu

Language: English - Date: 2013-03-28 10:28:06
62Cyberwarfare / Security / National security / Hacking / Internet of Things / Codenomicon / Vulnerability / Computer network security / Software testing / Computer security

Program Guide S A N S S e c u r i n g t h e In t e r n e t o f T h i n g s S u m m i t[removed]Agenda All Summit Sessions will be held in CA Thayer Ballroom (unless noted).

Add to Reading List

Source URL: www.sans.org

Language: English - Date: 2013-10-21 15:05:02
63Fuzz testing / Oulu University Secure Programming Group / Minneapolis / Geography of Minnesota / Computing / Minnesota / Software testing / Computer network security / Codenomicon

Cyber threat identification An Inconvenient truth MIKKO VARPIOLA Co-Founder, Codenomicon Ltd. http://www.codenomicon.com/

Add to Reading List

Source URL: www.cybersecuritysummit.org

Language: English - Date: 2013-06-06 16:40:22
64Cyberwarfare / Codenomicon / Software quality / Fuzz testing / Penetration test / Vulnerability / Fault injection / Mutation testing / Software testing / Computer network security / Computer security

DEFEND. THEN DEPLOY. for Penetration testing The purpose of penetration testing is to see whether it is possible to gain access into a system by trying out various attack scenarios. Penetration testing is still largely

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2010-08-31 06:36:34
65Computer Weekly / ComputerWeekly.com / Android software / Cross-platform software / Codenomicon / Smartphone / Application software / Skype / Windows Mobile / Software / Computing / Computer network security

http://www.computerweekly.com/Articles[removed][removed]securi

Add to Reading List

Source URL: www.codenomicon.com

Language: English - Date: 2008-05-29 04:03:06
66

Codenomicon Logo_HeartBleed_Bug_BLACK copy

Add to Reading List

Source URL: www.codenomicon.com

- Date: 2014-07-18 03:35:43
    67Computer network security / Hacking / United States Department of Homeland Security / Stuxnet / SCADA / Critical infrastructure protection / Zero-day attack / Vulnerability / Malware / Cyberwarfare / Computer security / Security

    SHOW PREVIEW Interview Insider Information

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2013-09-04 06:13:55
    68

    Codenomicon Logo_HeartBleed

    Add to Reading List

    Source URL: www.codenomicon.com

    - Date: 2014-06-12 08:35:52
      69

      Tulosta - www.professionaltester.com/files/PT-issue14.pdf

      Add to Reading List

      Source URL: www.codenomicon.com

      - Date: 2012-04-13 09:15:54
        70Test case / Robustness testing / Computing / Business / Technology / Fault injection / Software testing / Codenomicon / Fuzz testing

        DEFEND. THEN DEPLOY[removed]ECOND 8000

        Add to Reading List

        Source URL: www.codenomicon.com

        Language: English - Date: 2011-11-01 08:33:50
        UPDATE