Exploit

Results: 786



#Item
641Parallel computing / Procedural programming languages / Compiler optimizations / Intel C++ Compiler / Vectorization / SIMD / Cilk / SSE2 / Intel Cilk Plus / Computing / Computer programming / Concurrent computing

EXPLOIT CAPABILITIES WITHIN INTEL® XEON® PROCESSORS An Introduction to Vectorization with the Intel® C++ Compiler WHITE PAPER

Add to Reading List

Source URL: www.polyhedron.com

Language: English - Date: 2014-04-24 10:15:21
642Parallel computing / Compiler optimizations / Application programming interfaces / Intel Fortran Compiler / Profilers / Vectorization / SIMD / SSE2 / Fortran / Computing / Computer programming / Concurrent computing

EXPLOIT CAPABILITIES WITHIN INTEL® XEON® PROCESSORS An Introduction to Vectorization with the Intel® Fortran Compiler WHITE PAPER

Add to Reading List

Source URL: www.polyhedron.com

Language: English - Date: 2014-04-24 10:15:21
643Cyberwarfare / Espionage / Rogue software / Multi-agent systems / Spamming / Rogue security software / Spyware / Crimeware / Pharming / Malware / System software / Computer network security

Manufacturing Compromise: The Emergence of Exploit-as-a-Service 2 †

Add to Reading List

Source URL: www.christian-rossow.de

Language: English - Date: 2012-10-16 16:06:25
644Hacking / Software testing / Vulnerability / Exploit / Address space layout randomization / Microsoft Silverlight / Arbitrary code execution / Zero-day attack / Cross-site scripting / Computer security / Cyberwarfare / Software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-03-11 18:58:41
645Lakes / Environmental issues / Fisheries / Environmental impact of pharmaceuticals and personal care products / Environmental science / Pharmacology / Eutrophication / Environmental flow / Reservoir / Environment / Water / Earth

STARTING POINT • needs to be state of the art science • Can exploit comparative approach to contrast two countries • Why need international collaboration to do this?

Add to Reading List

Source URL: www.jst.go.jp

Language: English - Date: 2013-12-10 20:40:56
646Adobe Flash / Vulnerability / Adobe AIR / JavaScript / Adobe Systems / Exploit / Cross-site scripting / Software / Computing / Cross-platform software

Security Advisory SA2013-095

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-12-10 18:48:58
647Microsoft Windows / Hacking / Software testing / Vulnerability / Arbitrary code execution / Privilege escalation / Exploit / Windows / Ring / Computer security / Cyberwarfare / Computing

Security Advisory SA2011-008

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-10-08 17:27:27
648Hacking / Software testing / Vulnerability / Google Chrome / JavaScript / Firefox / Exploit / Arbitrary code execution / Computer security / Software / Computing / Computer network security

Security Advisory SA2013-092

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-11-15 19:25:33
649PHP programming language / Hacking / Software testing / Blog software / WordPress / Vulnerability / Exploit / Software / Cyberwarfare / Computer security

Security Advisory SA2013-077

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2013-09-12 17:57:31
650Hacking / Computer network security / Software testing / Vulnerability / Zero-day attack / Exploit / Apache HTTP Server / Arbitrary code execution / Patch / Cyberwarfare / Computer security / Software

Security Advisory SA2013-

Add to Reading List

Source URL: doa.alaska.gov

Language: English - Date: 2014-04-25 17:37:18
UPDATE