Hacking

Results: 3953



#Item
91Computer security / Cyberwarfare / Computing / Computer network security / Software testing / Vulnerability / Hacking / Zero-day / Buffer overflow / Metasploit Project / Code injection / Social vulnerability

224 IEEE TRANSACTIONS ON DEPENDABLE AND SECURE COMPUTING, VOL. 5,

Add to Reading List

Source URL: users.ece.cmu.edu

Language: English - Date: 2014-05-29 15:38:01
92Computing / Computer security / Cyberwarfare / Computer network security / Hacking / Cross-site scripting / Vulnerability / OWASP / Software quality / Application security / Software / Security

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity.ppt

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:17:57
93Hacker culture / Internet slang / OpenBSD / Hackathons / Computing / Technology / Software

Health Hackathon Handbook Section CONTENTS Health Hackathon Handbook MIT Hacking Medicine

Add to Reading List

Source URL: cdn.mithackmed.com

Language: English - Date: 2016-03-27 12:28:51
94Computer security / Cyberwarfare / Cybercrime / Hacking / Cross-site scripting / Hypertext Transfer Protocol / SQL injection / Code injection / Cross-site request forgery / Vulnerability / Full disclosure / HTTP cookie

VoidSec Advisory 2016

Add to Reading List

Source URL: www.exploit-db.com

Language: English - Date: 2016-04-13 11:30:11
95Hacking / Software testing / Vulnerability / Computer security / Cyberwarfare / Risk

Security Sub-Committee (SSC) Charter Version 1.0.1, April 21, 2015 Purpose Security mistakes in any AllSeen project could be publicly perceived as reflecting poorly on the AllSeen project as a whole. That could damage b

Add to Reading List

Source URL: wiki.allseenalliance.org

Language: English - Date: 2016-04-11 14:38:57
96Software / Computing / Web browsers / Mozilla / Internet advertising / Hacking / Cloud clients / Browser extension / Google Chrome / Browser security / Cross-site scripting / Firefox

2015 IEEE Symposium on Security and Privacy Ad Injection at Scale: Assessing Deceptive Advertisement Modifications  

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:43:06
97Hacking / Software testing / Vulnerability / Computer security / Cyberwarfare / Risk

Security Sub-Committee (SSC) Charter Version 1.0.1, April 21, 2015 This work is licensed under a Creative Commons Attribution 4.0 International License. http://creativecommons.org/licenses/by/4.0/ Unless otherwise noted,

Add to Reading List

Source URL: wiki.allseenalliance.org

Language: English - Date: 2016-04-11 14:41:58
98Hypothesis testing / Statistics / Hacking / Statistical inference / Computing / Hacker culture / P-value / Type I and type II errors / False positive rate / Hacker

False-Positives, p-Hacking, Statistical Power, and Evidential Value Leif D. Nelson University of California, Berkeley Haas School of Business Summer Institute

Add to Reading List

Source URL: www.bitss.org

Language: English - Date: 2016-01-25 14:32:58
99Computing / Software engineering / Cross-platform software / Hacking / JavaScript / Web programming / Cross-site scripting / HTTP cookie / Java / Tor / Same-origin policy / Web analytics

Server-driven Outbound Web-application Sandboxing FP7-ICT, Project Nohttps://www.websand.eu Deliverable D4.3

Add to Reading List

Source URL: websand.eu

Language: English - Date: 2015-05-06 05:08:51
100Computer security / Cyberwarfare / Computing / Computer network security / Web applications / Software testing / Hacking / Vulnerability / Application security / Web application security / Software quality / Foundstone

Microsoft PowerPoint - DenimGroup_IntroductionToApplicationSecurity

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:27:01
UPDATE