Exploit

Results: 786



#Item
511Cheating / Sociology / Sports law / Competitive video gaming / Video game cheating / Exploit / Deception / Cheat / Infidelity / Behavior / Gaming / Human behavior

Cheating in Mind Games: The Subtlety of Rules Matters   Ting Jiang University of Pennsylvania; CentER, Tilburg University Abstract

Add to Reading List

Source URL: sites.sas.upenn.edu

Language: English - Date: 2014-04-11 00:59:03
512Computing / Hacking / Software testing / Vulnerability / Hacker / SAINT / Attack / Exploit / Computer security / Computer network security / Cyberwarfare

When the tables turn Black Hat Asia 2004 SensePost Research Date:

Add to Reading List

Source URL: research.sensepost.com

Language: English - Date: 2012-08-03 08:26:17
513Computing / Honeypot / Remote file inclusion / Vulnerability / Denial-of-service attack / Exploit / Hacker / Malware / Client honeypot / Computer network security / Cyberwarfare / Computer security

T H E H O N E Y N E T P R O J E C T ® | KYT Paper Know Your Tools: A dynamic, low-interaction web application honeypot The Honeynet Project

Add to Reading List

Source URL: www.honeynet.org

Language: English - Date: 2014-01-06 14:17:05
514Investment / Financial regulation / Short / Short selling / Stock market / Financial services / Stock selection criterion / Financial economics / Financial markets / Finance

Exploit price collapse as tactical buying opportunity News from the financial markets | 16 October 2014 Exploit price collapse as tactical buying opportunity Bernd Hartmann, Head of Investment Research & Advisory Rolf K

Add to Reading List

Source URL: blog.vpbank.com

Language: English - Date: 2014-10-17 04:18:00
515Imaging / Optics / Haar-like features / Image gradient / Edge detection / Face detection / Histogram of oriented gradients / Object recognition / Computer vision / Image processing / Vision

Cat Head Detection - How to Effectively Exploit Shape and Texture Features Weiwei Zhang1, Jian Sun1 , and Xiaoou Tang2 1 2

Add to Reading List

Source URL: research.microsoft.com

Language: English - Date: 2008-07-25 13:15:53
516Computer network security / Evasion / Rootkit / Stonesoft Corporation / Hacker / Exploit / Network security / Attack / Advanced persistent threat / Computer security / Cyberwarfare / Computing

Wie Cyber-Kriminelle IT-Security Systeme umgehen Andreas Maar Senior Security Engineer

Add to Reading List

Source URL: www.lrz.de

Language: English - Date: 2014-04-02 09:57:15
517WordPress / Malware / Trojan horses / WP Symposium / Software / Blog software / PHP programming language

! ! MALWARE REMOVAL FOR A MAIL POET EXPLOIT - SUMMER 2014

Add to Reading List

Source URL: kitchensinkwp.com

Language: English - Date: 2014-08-10 16:19:41
518Software testing / Hacking / Nessus / Shellcode / Vulnerability / Exploit / Tenable Network Security / Hacker / Nmap / Software / Computer security / Cyberwarfare

Secrets of Vulnerability Scanning: Nessus, Nmap and More Ron Bowes - Researcher, Tenable Network Security 1

Add to Reading List

Source URL: sharkfest.wireshark.org

Language: English - Date: 2012-07-11 15:31:33
519Environment / Energy in the European Union / Renewable energy policy / Climate change policy / Energy policy of the European Union / European Union Emission Trading Scheme / European Union climate and energy package / National Renewable Energy Action Plan / European Union / Energy / Climate change in the European Union

Understanding the European Council deal on Energy and Climate From 2030 to TwentyDirty Key points: . This is much more a TwentyDirty deal than a 2030 deal. . The European Parliament should exploit all legal and political

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
520White hat / Cyberwarfare / Hacker / Attack / Exploit / Hacking / Computing / Computer security

Ivan_Buetler_Cyber_Espionage1

Add to Reading List

Source URL: www.csnc.ch

Language: English - Date: 2015-02-10 04:35:39
UPDATE