Relative Content

Web Application Security Testing

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh))

Ethical Hacking and Countermeasures: Attack Phases (EC-Council Certified Ethical Hacker (Ceh)) ISBN13: 9781435483606 Condition: New Notes: BRAND NEW FROM PUBLISHER! BUY WITH CONFIDENCE, Over one million books sold! 98% Positive feedback. Compare our books, prices and service to the competition. 100% Satisfaction Guaranteed The EC-Council | Press Ethical Hacking and Countermeasures Series is comprised of […]

Network Security Testing Product Comparison

Network Security Testing Product Comparison Network Security Testing Product Comparison Free Online Articles Directory Why Submit Articles? Top Authors Top Articles FAQ ABAnswers Publish Article 0 && $.browser.msie ) { var ie_version = parseInt($.browser.version); if(ie_version Login Login via Register Hello My Home Sign Out Email Password Remember me?Lost Password? Home Page > Computers > Networks […]

Source Boston 2010: Attacking WebOS 1/6

Clip 1/6 Speakers: Chris Clark, iSec Partners & Townsend Ladd Harris WebOS developers work with a large spectrum of web and system languages, including JavaScript, Java, and C++. WebOS is the first mobile platform that primarily uses web languages; however, we believe that they will become more common as platform vendors court the massive web […]

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research

Metasploit Toolkit for Penetration Testing, Exploit Development, and Vulnerability Research ISBN13: 9781597490740 Condition: New Notes: BUY WITH CONFIDENCE, Over one million books sold! 98% Positive feedback. Compare our books, prices and service to the competition. 100% Satisfaction Guaranteed This is the first book available for the Metasploit Framework (MSF), which is the attack platform of […]

Penetration Tester’s Open Source Toolkit, Vol. 2

Penetration Tester’s Open Source Toolkit, Vol. 2 ISBN13: 9781597492133 Condition: New Notes: BRAND NEW FROM PUBLISHER! BUY WITH CONFIDENCE, Over one million books sold! 98% Positive feedback. Compare our books, prices and service to the competition. 100% Satisfaction Guaranteed Penetration testing a network requires a delicate balance of art and science. A penetration tester must […]

Telos Releases Xacta Interview Tool

Telos Releases Xacta Interview Tool Telos® Corporation has released the first commercially available enterprise Open Checklist Interactive Language implementation tool. Read more on Business Wire via Yahoo! Finance Telos Releases Xacta Interview Tool ASHBURN, Va.–(BUSINESS WIRE)–Telos Corporation has released the first commercially available enterprise Open Checklist Interactive Language (OCIL) implementation tool, which is now available […]

Security Art’s RoboFraud

Fighting CyberCrime in the financial industry has been a losing battle for too long. Moving the battlefield back to the financial institutions control using RoboFraud will change the rules of the game. Video Rating: 5 / 5

SOURCE Barcelona 2010: Hacking SAP BusinessObjects

Speakers: Josh Abraham, Rapid7 & Will Vandevanter, Rapid7 Business intelligence is a multi-billion dollar/euro industry. At the top of the product food chain is BusinessObjects. BusinessObjects is a very widely deployed business intelligence tool thats focus is in managing, querying, analyzing, and reporting on business data. It is used by government entities (eg US Air […]