Forgery

Results: 1137



#Item
101Computing / Cyberwarfare / Computer security / HTML / Cross-site scripting / Hacking / Web applications / Data management / Cross-site request forgery / JavaScript / Web application firewall / SQL injection

PDF Document

Add to Reading List

Source URL: www.elearnsecurity.com

Language: English - Date: 2014-11-24 05:50:21
102

Understanding Forgery Properties of Spam Delivery Paths Fernando Sanchez Zhenhai Duan Yingfei Dong

Add to Reading List

Source URL: ceas.cc

Language: English - Date: 2010-06-18 09:53:22
    103Australia / Ern Malley / Helen Darville / My Life as a Fake / Miles Franklin Award / Literary forgery / Harold Stewart / Max Harris / Forgery / Literature / Deception / Australian literature

    Fakes, Literary Identity and Public Culture MARIA TAKOLANDER AND DAVID MCCOOEY, DEAKIN UNIVERSITY The fake presupposes the genuine. The fake author implies the real author, and

    Add to Reading List

    Source URL: dro.deakin.edu.au

    Language: English
    104Hacking / Clickjacking / Computer security / Software testing / Likejacking / Tapjacking / Penetration test / Like button / Cross-site request forgery / Computing / Facebook / Social engineering

    Introduction Attack vectors Counteractive measures Conclusion and outlook UI Redressing and Clickjacking:

    Add to Reading List

    Source URL: 2011.zeronights.org

    Language: English - Date: 2011-12-28 02:05:06
    105Computing / Software testing / Hacking / Vulnerability / Penetration test / Exploit / Threat model / Cross-site request forgery / SQL injection / Computer security / Cyberwarfare / Computer network security

    Secure Provision and Consumption in the Internet of Services FP7-ICT, ICTTrustworthy ICT) Project Nowww.spacios.eu

    Add to Reading List

    Source URL: www.spacios.eu

    Language: English - Date: 2014-10-17 10:36:52
    106Cross-platform software / Platform as a service / Cross-site request forgery / Timing attack / Password / Advantage / JavaScript / RSA / HTTP cookie / Cryptography / Computing / Cloud computing

    Cross-Tenant Side-Channel Attacks in PaaS Clouds Yinqian Zhang Ari Juels University of North Carolina

    Add to Reading List

    Source URL: pages.cs.wisc.edu

    Language: English - Date: 2014-12-20 11:41:32
    107

    cocktails forgery originals cool runnings Appleton VX Rum / Byrrh / Grapefruit / Nutmeg forged & bound

    Add to Reading List

    Source URL: static.urbandaddy.com

    Language: English - Date: 2015-05-12 16:11:23
      108Cross-site scripting / NTFS / Forensic science / Cross-site request forgery / Microsoft SQL Server / File system / Computer forensics / SQL injection / Computer security / Computing / Cyberwarfare

      PDF Document

      Add to Reading List

      Source URL: 7safe.com

      Language: English - Date: 2014-08-08 10:21:40
      109Computer security / Data management / Cross-site request forgery / Electronic commerce / SQL injection / Microsoft SQL Server / World Wide Web / Cyberwarfare / Computer network security / Security

      PDF Document

      Add to Reading List

      Source URL: 7safe.com

      Language: English - Date: 2015-01-23 11:16:05
      110Cyberwarfare / Internet privacy / Cryptographic protocols / Secure communication / HTTP cookie / Cross-site scripting / Cross-site request forgery / Man-in-the-middle attack / JavaScript / Computing / HTTP / Internet

      Web (In)Security: Remediation Efforts Status and Outlook Jeff Hodges Andy Steingruebl PayPal

      Add to Reading List

      Source URL: kingsmountain.com

      Language: English - Date: 2011-02-22 23:56:14
      UPDATE