Attacker

Results: 79



#Item
31Literature / Year of birth missing / Nationality / Erin Soros / Angela Readman / Canadian literature

TONY BAGLEY The Forgiveness Thing A journalist suspects the motives of a disfigured man who forgives his attacker.

Add to Reading List

Source URL: www.costa.co.uk

Language: English - Date: 2014-06-12 07:35:58
32System software / Identity management / Computer network security / Secure communication / Keystroke logging / Spyware / Password / Credential / Malware / Computer crimes / Software / Security

AN IDC INFOGRAPHIC, SPONSORED BY RAPID7 Cybercrime The Credentials Connection Scary Attacker Success Rates

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-04-23 09:46:35
33Computer network security / Hacking / Software testing / National security / Secure communication / Vulnerability / Exploit / Password / Markov decision process / Cyberwarfare / Computer security / Statistics

Towards Modelling Adaptive Attacker’s Behaviour⋆ Leanid Krautsevich1 , Fabio Martinelli2 , and Artsiom Yautsiukhin2 1 2

Add to Reading List

Source URL: wwwold.iit.cnr.it

Language: English - Date: 2012-10-09 09:04:02
34Nash equilibrium / Stackelberg competition / Schedule / Discrete mathematics / Minimax / Strategy / Solution concept / Game theory / Problem solving / Mathematics

Security Games with Multiple Attacker Resources Dmytro Korzhyk, Vincent Conitzer, Ronald Parr Department of Computer Science, Duke University Durham, NC 27708, USA {dima, conitzer, parr}@cs.duke.edu

Add to Reading List

Source URL: www.cs.duke.edu

Language: English - Date: 2011-04-18 16:25:10
35Cyberwarfare / Computer networking / Network performance / Denial-of-service attacks / Internet privacy / Denial-of-service attack / Exploit / Apache HTTP Server / Proxy server / Computing / Computer security / Computer network security

From Patches to Honey-Patches: Lightweight Attacker Misdirection, Deception, and Disinformation∗ Frederico Araujo Kevin W. Hamlen

Add to Reading List

Source URL: www.utdallas.edu

Language: English - Date: 2014-11-19 00:58:32
36Formation / Defender / Midfielder / Channel / Mark / Association football tactics and skills / Sports / Association football positions / Forward

Basic  Playing  Positions       Right  side  attacker-­‐right  wing:      

Add to Reading List

Source URL: aussiehockey.com.au

Language: English - Date: 2012-06-13 23:58:43
37Data synchronization / File hosting / Cloud computing / Online backup services / Cloud applications / Dropbox / Computer security / Malware / Firewall / Software / Computing / Computer network security

Case Study Date: [removed]Preface Many organizations users’ are using Dropbox to share files from anywhere. This has led to security concerns; data can leak easily with no control and can be used by an attacker to spr

Add to Reading List

Source URL: 2secure.biz

Language: English - Date: 2013-12-26 18:29:02
38Crime prevention / National security / Cryptographic software / Computing / Computer security / Electronic commerce / Attacker / TrueCrypt / Lorrie Cranor / Software / Security / Computer network security

02- Introduction to Security / Usable Encryption Engineering & Public Policy

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2015-03-03 17:53:52
39Ficus / Dice

Side Activation: Black Card: Defender Red Card: Attacker Unit Activation:  [removed]Action  Face 2 Actions [see nat reinf]

Add to Reading List

Source URL: webzoom.freewebs.com

Language: English
40Formation / Defender / Midfielder / Channel / Mark / Association football tactics and skills / Sports / Association football positions / Forward

Basic  Playing  Positions       Right  side  attacker-­‐right  wing:      

Add to Reading List

Source URL: www.hockey.org.au

Language: English - Date: 2013-02-06 00:26:59
UPDATE