Cyberwarfare

Results: 11990



#Item
681Cyberwarfare / Concurrency control / Software testing / Lock / OWASP / Vulnerability / Application security / Deadlock / Computing / Computer security / Threads

CONCURRENCY VULNERABILITIES OWASP BOOKS OWASP Testing Guide : ~NZ$18 + pp

Add to Reading List

Source URL: www.owasp.org

Language: English - Date: 2011-12-11 14:43:29
682Data privacy / Crime prevention / National security / Cyberwarfare / Application firewall / Health Insurance Portability and Accountability Act / Check Point / HITRUST / Security / Computer network security / Computer security

CareHubs HIPAA/HITECH Compliance Technical Security Measures Summary Updated: Jan 24th, 2014

Add to Reading List

Source URL: www.hivestrategies.com

Language: English - Date: 2014-10-17 11:23:09
683Computing / Firewalk / @stake / Qualys / Vulnerability / Certified Information Systems Security Professional / Security / Network security / CVSS / Computer security / Computer network security / Cyberwarfare

Mike Schiffman Mike Schiffman has over 12 years of experience in high-tech, most of which have been spent in computer security. He has worked in several different areas including research and development, consulting, wri

Add to Reading List

Source URL: packetfactory.openwall.net

Language: English - Date: 2005-08-16 14:21:24
684Cyberwarfare / Mathematics / RSA / Chosen-ciphertext attack / Ciphertext / Cryptanalysis / Prime number / Blum–Goldwasser cryptosystem / Merkle–Hellman knapsack cryptosystem / Public-key cryptography / Electronic commerce / Espionage

A chosen text attack on the RSA cryptosystem and some discrete logarithm schemes Y. Desmedt Aangesteld Navorser NFWO Katholieke Universiteit Leuven Laboratorium ESAT

Add to Reading List

Source URL: www.dtc.umn.edu

Language: English - Date: 1999-02-17 16:51:49
685Cyberwarfare / Cryptography / Cipher / Byrne

Exhibit #2 – Working Draft – B As Byrne writes “Si Vales Bene est W” at the top of each page, this is clearly another working draft for Exhibit #2. There are noted differences, however, between this Working Draf

Add to Reading List

Source URL: www.mountainvistasoft.com

Language: English - Date: 2013-05-28 14:39:26
686Cyber security standards / Cyberwarfare / Control system security / Professional certification / Department of Defense Cyber Crime Center / Computer security / Security / Computing

Wurldtech and Exida Announce Global Partnership March 17, 2009 Leading Industrial Cyber Security & Functional Safety Experts Partner to Deliver the Achilles Cyber Security Certification Program to Vendors & Operators of

Add to Reading List

Source URL: www.wurldtech.com

Language: English - Date: 2015-07-20 17:08:51
687Computer network security / Software testing / Hacking / Vulnerability / Validation / Computer security / Cyberwarfare / Security

Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

Add to Reading List

Source URL: www.spacios.eu

Language: English - Date: 2011-12-21 03:32:12
688Hacking / Software testing / Vulnerability / Image scanner / Network vulnerability scan / Social vulnerability / SAINT / Port scanner / Computer security / Computing / Cyberwarfare

FedRAMP JAB P-ATO Vulnerability Scan Requirements Guide   Version 1.0

Add to Reading List

Source URL: www.fedramp.gov

Language: English - Date: 2015-06-03 09:58:42
689Software testing / Computer network security / Hacking / Risk / Software bugs / Vulnerability / Social vulnerability / Buffer overflow / Database / Computer security / Cyberwarfare / Computing

=================================================================== PLOVER - Preliminary List Of Vulnerability Examples for Researchers =================================================================== [*] Author: Stev

Add to Reading List

Source URL: cwe.mitre.org

Language: English - Date: 2006-09-13 14:57:16
690Computer network security / CVSS / Security / Vulnerability / Social vulnerability / Qualys / Metric / Computer security / Cyberwarfare / Risk

The Common Vulnerability Scoring System Mike Schiffman, Cisco Systems The RSA Conference, February 2005 Today’s Agenda

Add to Reading List

Source URL: packetfactory.openwall.net

Language: English - Date: 2005-02-23 13:47:09
UPDATE