Skip to main content

Directory: All Listings 

Results 341 - 360 of 1237 This Category
All Listings

The annual DIMVA conference serves as a premier forum for advancing the state of the art in intrusion detection, malware detection, and vulnerability assessment. Each year DIMVA brings together international experts from academia, industry and government ...

For many years, Information Hiding has captured the imagination of researchers. Digital watermarking and steganography tools are used to address digital rights management, protect information, and conceal secrets. From an investigators perspective, inform ...

WebSlayer is a tool designed for bruteforcing Web Applications, it can be used for finding not linked resources (directories, servlets, scripts, etc), bruteforce GET and POST parameters, bruteforce Forms parameters (User/Password), Fuzzing, etc. The tools ...

Category Website Scanners

Oracle Directory Server Enterprise Edition (formerly SUN Directory Server Enterprise Edition) is the best known directory server with proven large deployments in carrier and enterprise environments. It is also the most supported directory by ISVs, so it ...

Qualys Patch Management is capable of detecting missing patches and deploying patches to all assets whether they're on premises, roaming or remote. Patch Management can be used to patch operating systems as well as 3rd-party applications from a large vari ...

Qualys Patch Management
PentesterLab

PentesterLab is an easy and great way to learn penetration testing. PentesterLab provides vulnerable systems that can be used to test and understand vulnerabilities. Hands-on There is only one way to properly learn web penetration testing: by getting y ...

Category Ethical Hacking
PentesterLab
ISECOM - Institute for Security and Open Methodologies

The premise of the training course is to support the necessary knowledge transfer for a person to be considered a capable, resourceful, and self-sufficient security tester. The training course focuses on the technical skills necessary for security testing ...

Category Ethical Hacking

Computers are now available anytime, anywhere, by different means, and distributed unobtrusively throughout the everyday environments in which physical objects/artifacts embedded with invisible computers are sensible and networked locally and globally. Su ...

FIRST conferences promote worldwide coordination and cooperation among Computer Security Incident Response Teams (CSIRTs). The conference provides a forum for sharing goals, ideas, and information on how to improve global computer security. The five-day e ...

SACMAT is a successful series of symposiums that continue the tradition, first established by the ACM Workshop on Role-Based Access Control, of being the premier forum for presentation of research results and experience reports on leading edge issues of a ...

SysTools Software

MailXaminer is a comprehensive email examination tool to carry out a thorough analysis of a bunch of emails and its header. With the help of this tool; forensicators can preview more than 20 email file types and perform advanced search operation within th ...

Category Forensic Tools
MailXaminer
University of Westminster

4 years Full Time

Packed with 49 powerful tools, Engineer’s Toolset delivers the network management, monitoring, and troubleshooting tools you need to easily and effectively manage your infrastructure – all in one extremely affordable package. The toolset includes the SNM ...

Category Network Scanners

Password Manager Pro is a secure vault for storing and managing shared sensitive information such as passwords, documents and digital identities of enterprises. The benefits of deploying Password Manager Pro include: Eliminating password fatigue and s ...

Password Manager Pro

Easy to use and fast to deploy Privileged Access Management (PAM) available both on-premises or in the cloud. IBM Security Verify Privilege Vault makes it easy to identify and secure all service, application, administrator, and root accounts across your ...

IBM Security Verify Privilege Vault
German Informatics Society

In order to advance the fields of IT-Incident Management and Forensics the special interest-group Security - Intrusion Detection and Response (SIDAR) of the German Informatics Society (GI) organises an annual conference, bringing together experts from thr ...

The theme of the conference is the protection of computer networks. The conference will draw participants from academia and industry in Europe and beyond to discuss hot topics in applied network and systems security. Topics include but are not limited to ...

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal e ...

a.c.neumann at gmail.com

Andiparos is a fork of the famous Paros Proxy. It is an open source web application security assessment tool that gives penetration testers the ability to spider websites, analyze content, intercept and modify requests, etc. The advantage of Andiparos is ...

Category Website Scanners

RVAsec is the first Richmond, VA based security convention that showcases local talent as well as brings the best speakers to the midatlantic region.  RVAsec attracts over 400 security professionals from across the country.  The conference is dual-track a ...