Security testing

Results: 3214



#Item
21Computing / Security / Computer security / E-commerce / Secure communication / Tor / Ricochet / Software testing / Cryptography / Vulnerability / Transport Layer Security / Data validation

Ricochet Security Assessment Ricochet February 15, 2016 – Version 1.2 Prepared for John Brooks

Add to Reading List

Source URL: penetrationstest.se

Language: English - Date: 2016-04-11 13:49:12
22Computing / Software testing / Software engineering / Software quality / Common Weakness Enumeration / Vulnerability / Coverity / Analysis / Fortify Software / Application security / LDRA Testbed / Static program analysis

Advanced Science and Technology Letters Vol.93 (Security, Reliability and Safety 2015), pp.5-8 http://dx.doi.orgastlA Software Weakness Analysis Technique for Secure Software

Add to Reading List

Source URL: onlinepresent.org

Language: English - Date: 2015-04-19 22:44:46
23Recruitment / Background check / Law enforcement / Security / Sheriffs in the United States / Criminal record / Prevention / Safety / Government

DRUG TESTING, CRIMINAL BACKGROUND CHECK, AND HIRING CHECKLIST Before the offer of employment can be made, the department head/elected official must have the Applicant complete the following: □

Add to Reading List

Source URL: gov.pulaskionline.org

Language: English - Date: 2015-04-21 15:35:44
24Computing / Computer security / Cyberwarfare / Hacking / Data management / Software architecture / Software testing / SQL / SQL injection / Foundstone / OWASP / Vulnerability

Microsoft PowerPoint - AnIntroductionToApplicationSecurityInJ2EEEnvironments_JavaMUG.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:16:27
25Computer security / Security / Prevention / Crime prevention / Data security / National Security Agency / National Information Assurance Partnership / Common Criteria Evaluation and Validation Scheme / Common Criteria Testing Laboratory / Common Criteria / Protection Profile / Evaluation Assurance Level

Microsoft Word - scheme-differences-2013.docx

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
26Cryptography standards / Computer security / Cryptography / Evaluation / FIPS 140-2 / Common Criteria / FIPS 140 / Common Criteria Testing Laboratory / Cryptographic Module Testing Laboratory

Microsoft Word - Choose_Testing_Lab.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-10 07:41:12
27Security / Computer security / Computing / Software testing / Computer network security / Cryptography / National security / Information security / Penetration test / Professional certification / Vulnerability / Security testing

Microsoft Word - choose_the_right_pentesting_company.doc

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-15 04:21:33
28Microsoft / Computing / Prevention / Data security / Cryptography / FIPS 201 / Standards / Request for information / Information security / Outlook.com / PIV / Email

NPIVP Testing Request for Information NPIVP Testing Request for Information

Add to Reading List

Source URL: www.atsec.com

Language: English - Date: 2015-09-14 07:32:40
29Security / Safety / Crime prevention / Aerospace engineering / Aviation safety / Flight test / Product testing / Security alarm / Closed-circuit television / Computer security / Cockpit / AD Aerospace

AIRCRAFT SECURITY AND SAFETY REMOTE REAL-TIME SURVEILLANCE. WIRELESS COMMAND AND CONTROL FOR CRITICAL SYSTEMS. We provide the industry’s leading solutions to internal and external aircraft surveillance and situational

Add to Reading List

Source URL: www.meggitt.com

Language: English - Date: 2016-07-22 06:47:31
30Computing / Software development process / Cloud infrastructure / Agile software development / DevOps / Information technology management / Webroot / To The New / Cloud computing / Software testing / DevOps toolchain

Case Study | Security/Technology | Cloud Automation & Management SELF-SERVICE INFRASTRUCTURE DEVOPS Webroot delivers next-generation endpoint security and threat intelligence services to protect businesses and individua

Add to Reading List

Source URL: www.kovarus.com

Language: English - Date: 2016-07-11 19:38:57
UPDATE