Vulnerability

Results: 14773



#Item
951http://www.sektioneins.de  Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

http://www.sektioneins.de Security Problems in Web Applications except Injection Vulnerabilities Stefan Esser <> Ben Fuhrmannek <>

Add to Reading List

Source URL: www.nds.rub.de

Language: English - Date: 2011-02-06 15:51:10
952Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Static Detection and Automatic Exploitation of Intent Message Vulnerabilities in Android Applications Daniele Gallingani Rigel Gjomemo, V.N. Venkatakrishnan

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2015-05-20 23:58:55
9532nd International Conference on Waterside Security 3-5 November 2010, Marina di Carrara, Italy Reducing Vulnerability Through Multi-National Collaboration. Plenary Session: Wednesday, 3 Nov 2010, 09:50 , Michelangelo Roo

2nd International Conference on Waterside Security 3-5 November 2010, Marina di Carrara, Italy Reducing Vulnerability Through Multi-National Collaboration. Plenary Session: Wednesday, 3 Nov 2010, 09:50 , Michelangelo Roo

Add to Reading List

Source URL: www.wss2010.org

Language: English - Date: 2010-10-07 04:49:59
954New York City Panel on Climate Change 2015 ReportChapter 5: Public Health Impacts and Resiliency

New York City Panel on Climate Change 2015 ReportChapter 5: Public Health Impacts and Resiliency

Add to Reading List

Source URL: www.theworldisyourocean.net

Language: English - Date: 2015-04-21 12:36:27
955In Brief  WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

In Brief WideAngle Managed Security Services (MSS) The threat landscape is evolving quickly – and Managed Security Services (MSS) can be

Add to Reading List

Source URL: www.nttcomsecurity.com

Language: English - Date: 2015-07-14 05:58:47
956OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Kent Landfield – Intel Corporation Steven Piliero – Unified Compliance

OVAL Board MeetingAttendees Blake Frantz – Center for Internet Security Adam Montville – SACM Kent Landfield – Intel Corporation Steven Piliero – Unified Compliance

Add to Reading List

Source URL: oval.mitre.org

Language: English - Date: 2015-07-09 13:27:05
957Report  Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Report Black Hat 2015: State of Security Endpoint Risk Overshadows All Others

Add to Reading List

Source URL: www.bromium.com

Language: English
958Model-Based Vulnerability Testing for Web Applications Franck Lebeau∗ , Bruno Legeard∗† , Fabien Peureux∗ and Alexandre Vernotte∗ ∗ FEMTO-ST  Institute - DISC department - UMR CNRS 6174

Model-Based Vulnerability Testing for Web Applications Franck Lebeau∗ , Bruno Legeard∗† , Fabien Peureux∗ and Alexandre Vernotte∗ ∗ FEMTO-ST Institute - DISC department - UMR CNRS 6174

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2013-03-01 18:57:54
    959Housing and Community Risk Multiple Hazard Risk Assessment Dana Brechwald, Resilience Planner, ABAG  Cynthia Kroll, Chief Economist and Primary

    Housing and Community Risk Multiple Hazard Risk Assessment Dana Brechwald, Resilience Planner, ABAG Cynthia Kroll, Chief Economist and Primary

    Add to Reading List

    Source URL: resilience.abag.ca.gov

    Language: English - Date: 2015-03-12 15:22:33
    960Defensics  Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

    Defensics Build a More Resilient World KEY DEFENSICS FEATURES: • Next-Gen Fuzzing Technology Utilizes template, generation

    Add to Reading List

    Source URL: www.codenomicon.com

    Language: English - Date: 2016-03-02 04:58:12