Vulnerability database

Results: 242



#Item
61Software testing / Computer network security / Hacking / Electronic commerce / Application security / Cross-site scripting / Vulnerability / Penetration test / Database security / Cyberwarfare / Computer security / Security

PatchAdvisor_LOGO-revised-FINAL

Add to Reading List

Source URL: www.patchadvisor.com

Language: English - Date: 2014-12-12 12:21:09
62World Bank / Database / Database theory / Social vulnerability

Microsoft PowerPoint - Break out group 2.ppt

Add to Reading List

Source URL: unfccc.int

Language: English - Date: 2008-03-13 08:29:08
63Cross-platform software / Java platform / Query languages / SQL / Null / Java / Where / Oracle Database / Vulnerability / Computing / Relational database management systems / SQL keywords

SecureAssist Custom Rule Tutorial October 2014 www.Cigital.com North America: +[removed]

Add to Reading List

Source URL: www.cigital.com

Language: English - Date: 2014-10-08 15:38:40
64McAfee / Computer security / Companies listed on the New York Stock Exchange / Database security / Database / Oracle Corporation / Vulnerability / Sentrigo / McAfee VirusScan / Database management systems / Computing / Software

Business Brief Defend Legacy Databases and Operating Systems Extend protection and compliance to EOL servers and databases

Add to Reading List

Source URL: www.mcafee.com

Language: English - Date: 2014-01-10 01:03:35
65Computing / Database activity monitoring / Threat / Insider / Malware / IBM / Vulnerability / Guardium /  an IBM Company / Insider trading / Computer network security / Cyberwarfare / Computer security

IBM Security White Paper Executive Summary Stay ahead of insider threats with predictive,

Add to Reading List

Source URL: www.infosecurityproject.com

Language: English - Date: 2014-10-22 23:56:46
66Cyberwarfare / Information security / Access control / Vulnerability / Security controls / Backup / Cloud computing security / Database audit / Computer security / Security / Data security

Logging and Monitoring Procedure (MPF1275) GOVERNING POLICY This procedure is made under the Information Security Policy. SCOPE This procedure applies to:

Add to Reading List

Source URL: policy.unimelb.edu.au

Language: English
67Software testing / Cyberwarfare / Computer security / Hacking / Vulnerability / Oracle Corporation / Application security / Oracle Database / SQL / Computing / Relational database management systems / Software

® Agile Software Security PRODUCT BRIEF Every build,

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-06-20 10:20:36
68Cyberwarfare / Imperva / Application firewall / Qualys / Database activity monitoring / Application security / Vulnerability / Payment Card Industry Data Security Standard / Firewall / Computer network security / Computer security / Computing

Web Protecting the Data That Drives Business® Web Application Security Protect Your Critical Web Applications The market-leading Imperva SecureSphere Web Application Firewall:

Add to Reading List

Source URL: www.edvancesecurity.com

Language: English - Date: 2012-05-04 01:38:46
69Software testing / Cyberwarfare / Computer security / Hacking / Vulnerability / Oracle Corporation / Application security / Oracle Database / SQL / Computing / Relational database management systems / Software

® Agile Software Security PRODUCT BRIEF Every build,

Add to Reading List

Source URL: www.quotium.com

Language: English - Date: 2014-06-20 10:09:34
70Relational database management systems / Data management / SQL / SQL injection / Hacking / Software testing / Imperva / Vulnerability / Stored procedure / Computing / Computer security / Cyberwarfare

Self-Defending Databases Alexander Kornbrust, Red-Database-Security GmbH Agenda ¡ Introduction

Add to Reading List

Source URL: www.red-database-security.com

Language: English - Date: 2012-11-02 12:58:49
UPDATE