Vulnerability database

Results: 242



#Item
101Cross-platform software / Software testing / 4GL / ABAP / Relational database management systems / SAP AG / Profiling / COBOL / Vulnerability / Computing / Software / SAP

Microsoft Word - ibm-8765_schumacher.doc

Add to Reading List

Source URL: www.ibm.com

Language: English - Date: 2012-01-13 18:17:42
102Software testing / Hacking / Vulnerability / Database / Data validation / JavaScript / Information security audit / Software security assurance / Cyberwarfare / Computing / Computer security

Auditing a Web Application Brad Ruppert SANS Technology Institute GWAS Presentation

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2012-08-27 12:08:53
103Cyberwarfare / Database management system / Information security / Access control / Operating system / Password / System administrator / Vulnerability / Management System of State Information System / Security / Computer security / Computing

DOC Document

Add to Reading List

Source URL: bgs.vermont.gov

Language: English - Date: 2014-12-03 13:06:28
104Security / CVSS / Common Vulnerabilities and Exposures / Vulnerability / National Vulnerability Database / Social vulnerability / Security Content Automation Protocol / SAINT / Computer security / Cyberwarfare / Computer network security

VULN Capability Description v2

Add to Reading List

Source URL: www.us-cert.gov

Language: English - Date: 2014-11-12 16:38:29
105Emergency management / Humanitarian aid / Risk / Actuarial science / Disaster risk reduction / International Decade for Natural Disaster Reduction / Social vulnerability / Database / Disaster / Management / Public safety / Disaster preparedness

Conceptual model: 3 application areas Recording Disaster Losses Recommendations for a European approach

Add to Reading List

Source URL: reliefweb.int

Language: English - Date: 2014-01-16 07:30:05
106Insider / Threat / Network security / Abuse / Vulnerability / Database activity monitoring / Cyberwarfare / Computer security / Computer network security

SpectorSoft 2014 Insider Threat Survey An overview of the insider threat landscape and key strategies for mitigating the threat challenge Executive Summary SpectorSoft recently surveyed 355 IT professionals, asking about

Add to Reading List

Source URL: downloads.spectorsoft.com

Language: English - Date: 2014-08-20 16:52:23
107Cyberwarfare / Database management system / Information security / Access control / Operating system / Password / System administrator / Vulnerability / Management System of State Information System / Security / Computer security / Computing

DOC Document

Add to Reading List

Source URL: bgs.vermont.gov

Language: English - Date: 2014-10-30 10:36:26
108Cyberwarfare / Vulnerability / Database security / Information security audit / Penetration test / Information security / Security controls / Network security / Threat / Security / Computer security / Computer network security

USMMA Security Contols Were Not Sufficient to Protect Sensitive Data from Unauthorized Access

Add to Reading List

Source URL: www.oig.dot.gov

Language: English - Date: 2014-07-25 15:09:31
109Computer network security / Data security / Software testing / Vulnerability / Information security / Database security / Security testing / Security risk / Security controls / Computer security / Security / Cyberwarfare

Department of Health and Human Services OFFICE OF INSPECTOR GENERAL HEALTH INSURANCE MARKETPLACES GENERALLY PROTECTED PERSONALLY

Add to Reading List

Source URL: www.healthreformgps.org

Language: English - Date: 2014-09-24 14:02:12
110Database / Vulnerability / Computer-aided design / Analysis / Cyberwarfare / Mind / Nastran / Computer security / Social vulnerability

FASTGEN Fast Shotline Generator Prediction of damage to a target caused by ballistic impact of projectiles has been an important long-time goal of

Add to Reading List

Source URL: www.dsiac.org

Language: English - Date: 2015-01-03 14:43:14
UPDATE