Hacking

Results: 3953



#Item
991Computability theory / Theoretical computer science / Software testing / Hacking / Vulnerability / Social vulnerability / Buffer overflow / Electronic signature / Halting problem / Mathematics / Applied mathematics / Computer science

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
992Electronic warfare / Hacking / Computer security / Military technology / National security / Threat / Central Intelligence Agency / Computer network security / Security / Cyberwarfare

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: www.webroot.com

Language: English - Date: 2015-03-27 15:18:02
993Computer network security / Software testing / Rapid7 / Hacking / Vulnerability management / Social vulnerability / Vulnerability / Metasploit Project / Computer security / Software / System software

Nexpose Certified Administrator: Introduction to Nexpose What is it? Are you a security professional that doesn’t quite know where to begin getting an understanding of what kind of devices are in your environment, or h

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-03-26 11:34:29
994Cyberwarfare / Infocomm Development Authority of Singapore / War / Communication / Military science / Electronic warfare / Hacking / Military technology

PDF Document

Add to Reading List

Source URL: www.stee.stengg.com

Language: English - Date: 2014-10-24 03:14:25
995Malware / Hacking / Software testing / Buffer overflow / Vulnerability / Computer worm / Computer virus / Social vulnerability / Cyberwarfare / Computer security / Failure

Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
996Computing / Computer network security / Hacking / Software bugs / Application security / Vulnerability / Penetration test / Attack patterns / Secure coding / Software testing / Computer security / Cyberwarfare

White paper The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2015-04-01 08:31:14
997Hacking / Software testing / Vulnerability / Debian / Social vulnerability / Trend Micro / Computer security / Software / Cyberwarfare

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2014-12-30 00:29:42
998Cyberwarfare / Crime / Electronic warfare / Hacking / Military technology / Data breach / Identity theft / Computer security / Computer crime / Security / Computer network security / Secure communication

2014 DATA BREACH INVESTIGATIONS REPORT INSIDER MISUSE DOS ATTACKS

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2014-05-13 13:02:57
999Computer security / Advanced persistent threat / Hacking / EMC Corporation / Computer network security / Phishing / Malware / RSA / Social engineering / Cyberwarfare / Cryptography / Cybercrime

Microsoft PowerPoint - JWP_Binde_McRee_OConnor_slideswnotes.pptx

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-01-28 15:59:41
1000Computer security / Hacking / Computer network security / Vulnerability / Communications protocol / Social vulnerability / Symbolic execution / Intrusion prevention system / Parsing / Computing / Software testing / Cyberwarfare

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56
UPDATE