Security bug

Results: 244



#Item
31Crime prevention / National security / Computing / Software quality / Evaluation / Common Criteria / Software bug / Fuzz testing / Reliability engineering / Software testing / Security / Computer security

CHAPTER 26 System Evaluation and Assurance If it’s provably secure, it probably isn’t.

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2011-12-05 05:56:48
32Software testing / Security / Hacking / Vulnerability / Application security / Penetration test / Cross-site scripting / Software bug / Software security assurance / Cyberwarfare / Computer security / Computer network security

ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions ACROS Application Security Analysis Frequently Asked Questions 1. What is the ACROS Application Security Analysis?

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:08
33Software engineering / Quality assurance / Software assurance / Software testing / Vulnerability / Software bug / DHS Directorate for Science and Technology / Computer security / Application security / Software quality / Security / Computing

The Vision Software Assurance Marketplace A Transformative Force in the Software Ecosystem www.ContinuousAssurance.org

Add to Reading List

Source URL: www.dhs.gov

Language: English - Date: 2013-10-28 17:01:42
34Cyberwarfare / Hacking / Vulnerability / Malware / Social vulnerability / Software bug / Twitter / Exploit / Software testing / World Wide Web / Computer security

Washington DC – FebA 0-day’s life “Offense as Defense” Panel Discussion – Offensive Markets for Vulnerability Research – Pros and Cons

Add to Reading List

Source URL: revuln.com

Language: English - Date: 2013-04-04 19:34:02
35Debugging / Computer security / Software development process / OpenOffice.org / Software / Software testing / Software bug

A Systematic Study of Automated Program Repair: Fixing 55 out of 105 bugs for $8 Each Claire Le Goues Michael Dewey-Vogt Computer Science Department University of Virginia

Add to Reading List

Source URL: www.genetic-programming.org

Language: English - Date: 2012-06-28 00:31:08
36Internet / Email privacy / Gmail / Web bug / Webmail / Steganography / Anonymous remailer / Message transfer agent / Public-key cryptography / Email / Computer-mediated communication / Computing

Privacy Preserving Web-Based Email Kevin Butler, William Enck, Jennifer Plasterr, Patrick Traynor, and Patrick McDaniel Systems and Internet Infrastructure Security Laboratory The Pennsylvania State University University

Add to Reading List

Source URL: www.enck.org

Language: English
37Emergency management / Security / Survival kit / Camping / Bleach / First aid kit / United States Department of Homeland Security / Bug-out bag / Survival skills / Disaster preparedness / Public safety

Additional Items to Consider Adding to an Emergency Supply Kit: ❑ Prescription medications and glasses ❑ Infant formula and diapers ❑ Pet food and extra water for your pet ❑ Important family documents such as co

Add to Reading List

Source URL: urbansurvivalsite.com

Language: English - Date: 2013-12-05 14:39:23
38Public safety / Disaster preparedness / Security / Emergency management / Bags / Bug-out bag / Retreat / Emergency evacuation / Disaster / Survivalism / Survival skills / Social movements

CAPTAIN DAVE’s SURVIVAL GUIDE (Thanks Cap’n Dave) Introduction For too long, the term "survivalist" has called to mind paranoid separatists or white supremacists who give up the conveniences of

Add to Reading List

Source URL: urbansurvivalsite.com

Language: English - Date: 2013-12-05 14:36:34
39Computer network security / Hacking / Software bug / Password / Cross-site scripting / Vulnerability / Kernel / Security token / Two-factor authentication / Computer security / Cyberwarfare / Security

PDF Document

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-12-06 13:14:25
40Internet / HTTP cookie / Web bug / Web analytics / Online advertising / Local shared object / Google Chrome / Ghostery / Privacy / Software / Internet privacy / Computing

The Case for a General and Interaction-based Third-party Cookie Policy Istemi Ekin Akkus Nicholas Weaver

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-11 00:01:22
UPDATE