Application security

Results: 14395



#Item
711

Optimiser ses attaques Web avec Burp Suite Nicolas Grégoire Agarri Application Security Forum 2013 Western Switzerland

Add to Reading List

Source URL: www.agarri.fr

Language: French - Date: 2013-10-23 13:39:36
    712Network performance / Computing / Network management / Internet security / System software / Denial-of-service attacks / Cyberwarfare / Denial-of-service attack / Internet Relay Chat / Packet loss / Throughput / Transmission Control Protocol

    Temporal Lensing and its Application in Pulsing Denial-of-Service Attacks Ryan Rasti∗† , Mukul Murthy∗ , Nicholas Weaver∗† , Vern Paxson∗† ∗ UC Berkeley, † ICSI,  VMware Abstract—We introduce tempor

    Add to Reading List

    Source URL: icir.org

    Language: English - Date: 2015-04-22 12:30:04
    713

    Improving Application Security Through TLS-Library Redesign Leo St. Amour1 and W. Michael Petullo2 1 Northeastern University

    Add to Reading List

    Source URL: www.flyn.org

    Language: English - Date: 2016-03-03 18:18:28
      714Software / Computing / Application software / Scientific method / Salvatore J. Stolfo / User / Milgram experiment / Statistics / ROOT / Internet privacy / Data analysis / Windows Vista

      On the Design and Execution of Cyber-Security User Studies: Methodology, Challenges, and Lessons Learned Malek Ben Salem and Salvatore J. Stolfo Computer Science Department Columbia University

      Add to Reading List

      Source URL: ids.cs.columbia.edu

      Language: English - Date: 2011-09-04 10:44:35
      715Computing / Internet protocols / Network architecture / Computer network security / Cyberwarfare / Transmission Control Protocol / HTTP cookie / Port / Network packet / Firewall / Network socket / Application layer

      Protocol-Independent Adaptive Replay of Application Dialog Weidong Cui† , Vern Paxson‡ , Nicholas C. Weaver‡ , Randy H. Katz† † University of California, Berkeley, CA ‡ International Computer Science Institut

      Add to Reading List

      Source URL: www1.icsi.berkeley.edu

      Language: English - Date: 2012-09-26 16:43:00
      716

      COMMISSIONED SCHOOL SECURITY OFFICER APPLICATION FOR OFFICE USE ONLY EFFECTIVEEXPIRES ____________

      Add to Reading List

      Source URL: static.ark.org

      Language: English - Date: 2015-08-31 18:28:04
        717Computing / Internet of Things / Ambient intelligence / Cryptography / Constrained Application Protocol / Internet privacy / Computer security / Bluetooth / Big data / Cloud computing / Privacy / Communications protocol

        ESORICS 2015 Program Guide 21 – 25 September 2015 Vienna, Austria www.esorics2015.sba-research.org

        Add to Reading List

        Source URL: esorics2015.sba-research.org

        Language: English - Date: 2015-09-22 04:00:14
        718

        Security Planning and Design The most secure applications are planned that way. Casaba can help you build security into your application from the ground up. Let Casaba Help with Your Security Planning and Design Building

        Add to Reading List

        Source URL: www.casaba.com

        Language: English
          719Employment / Recruitment / Application for employment / Social Security / Americans with Disabilities Act

          Hank’s Haute Dogs ~ Application | CORAL STREET Honolulu, HIp ~ 5 3 2 ~ H A N Kf. 80 8~ 5 3 2 ~

          Add to Reading List

          Source URL: www.hankshautedogs.com

          Language: English - Date: 2015-10-20 15:28:00
          720

          Appeared in the 23rd Annual IFIP WG 11.3 Working Conference on Data and Application Security, 2009, pp. 252–267. Improving Cut-and-Choose in Verifiable Encryption and Fair Exchange Protocols using Trusted Computing Te

          Add to Reading List

          Source URL: www.uncg.edu

          Language: English - Date: 2009-10-01 15:00:03
            UPDATE