Test cross

Results: 550



#Item
161Ethics / Application security / Penetration test / System testing / Cross-site scripting / Vulnerability / Security testing / Trust / Software testing / Cyberwarfare / Computer security

INTER-TRUST – ICT FP7- G.A[removed]Interoperable Trust Assurance Infrastructure Proceedings of the first INTERTRUST workshop

Add to Reading List

Source URL: inter-trust.lcc.uma.es

Language: English - Date: 2015-02-06 09:06:35
162Computer network security / Software testing / Cross-site scripting / Hacking / Cross-site request forgery / Vulnerability / Code injection / Penetration test / SQL injection / Computer security / Cyberwarfare / Computing

Damn Vulnerable Web App Ryan Dewhurst, Aralık 2009, WGT E-Dergi 3. Sayı I wanted an application developed in PHP/MySQL that was vulnerable to the most common types of web application vulnerabilities, that I could pract

Add to Reading List

Source URL: webguvenligi.org

Language: English - Date: 2011-08-03 19:42:25
163Computer network security / Computing / Risk / Hacking / Vulnerability / Cross-site scripting / CVSS / Penetration test / Fortify Software / Cyberwarfare / Computer security / Software testing

White paper HP 2012 Cyber Risk Report

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2013-02-25 11:05:35
164Computer network security / Cross-site scripting / Cross-site request forgery / JavaScript / Rapid7 / Instructure / Penetration test / Resolution / SQL injection / Computer security / Computing / Software

CANVAS by Instructure Bugcrowd Flex Program Results December 2014 Executive Summary Bugcrowd Inc was engaged by Instructure to perform a Flex Bounty program, commonly known

Add to Reading List

Source URL: www.canvaslms.com

Language: English - Date: 2015-04-14 16:58:35
165Software testing / Computer network security / Source code / Hacking / Vulnerability / Penetration test / Code review / Cross-site scripting / Software quality / Computer security / Cyberwarfare / Computing

Report on Source Code Security Analysis

Add to Reading List

Source URL: www.ipa.go.jp

Language: English - Date: 2015-03-30 23:00:24
166Extreme programming / Software development process / Software testing / Test-driven development / Software bug / Embedded system / Cross compiler / Eval / Compiler / Software development / Software / Computing

Test-Driven Development for Embedded C

Add to Reading List

Source URL: media.pragprog.com

Language: English - Date: 2014-08-29 20:35:29
167Psychometrics / Evaluation / Sports science / Test / Knowledge / Education / Standardized tests / Educational psychology

Grade 5 Smarter Balanced Practice Test Cross-walk Braille Mathematics Test1 Order of Items Scoring Guides Pilot Test Practice Test Item2

Add to Reading List

Source URL: californiatac.org

Language: English - Date: 2014-12-12 11:12:22
168Computer network security / Software testing / Hacking / Vulnerability / Cross-site scripting / SQL injection / Code review / Software bug / Penetration test / Computer security / Cyberwarfare / Computing

An Empirical Study on the Effectiveness of Security Code Review Anne Edmundson1 , Brian Holtkamp2 , Emanuel Rivera3 , Matthew Finifter4 , Adrian Mettler4 , and David Wagner4 1 Cornell University, Ithaca, NY, USA

Add to Reading List

Source URL: www.cs.berkeley.edu

Language: English - Date: 2015-01-21 19:48:40
169C POSIX library / Cross-platform software / Procedural programming languages / Open / Test / Constant / D / C / Write / Computing / Software engineering / Computer programming

Mach3 Version 3.x Macro Programmers Reference Manual Draft Revision 0.23 August 22nd, 2010 For Mach3 v3 versions thru[removed].

Add to Reading List

Source URL: www.machsupport.com

Language: English - Date: 2013-06-23 11:43:10
170Software testing / Computing / Hacking / Penetration test / Application security / Vulnerability / OWASP / Web application security / Cross-site scripting / Computer security / Computer network security / Cyberwarfare

SWAT PRODUCT BROCHURE WEB APPLICATION SECURITY Web application security has been a huge challenge for companies during the last couple of years since there are very few competent solutions available in the market. The

Add to Reading List

Source URL: www.outpost24.com

Language: English - Date: 2014-12-15 07:24:52
UPDATE