Hacking

Results: 3953



#Item
991Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Towards Automatic Generation of Vulnerability-Based Signatures David Brumley, James Newsome, and Dawn Song Carnegie Mellon University Pittsburgh, PA, USA {dbrumley,jnewsome,dawnsong}@cmu.edu

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
992The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

The Importance of Cyber Threat Intelligence to a Strong Security Posture Sponsored by Webroot Independently conducted by Ponemon Institute LLC Publication Date: March 2015

Add to Reading List

Source URL: www.webroot.com

Language: English - Date: 2015-03-27 15:18:02
993Nexpose Certified Administrator: Introduction to Nexpose What is it? Are you a security professional that doesn’t quite know where to begin getting an understanding of what kind of devices are in your environment, or h

Nexpose Certified Administrator: Introduction to Nexpose What is it? Are you a security professional that doesn’t quite know where to begin getting an understanding of what kind of devices are in your environment, or h

Add to Reading List

Source URL: www.rapid7.com

Language: English - Date: 2015-03-26 11:34:29
994

PDF Document

Add to Reading List

Source URL: www.stee.stengg.com

Language: English - Date: 2014-10-24 03:14:25
995Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

Sting: An End-to-End Self-Healing System for Defending against Internet Worms David Brumley1 , James Newsome2 , and Dawn Song3 1 2 3

Add to Reading List

Source URL: bitblaze.cs.berkeley.edu

Language: English - Date: 2013-03-28 20:19:28
996White paper  The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

White paper The Evolution of a Taxonomy: Ten Years of Software Security HP Security Research

Add to Reading List

Source URL: www.hpenterprisesecurity.com

Language: English - Date: 2015-04-01 08:31:14
997Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

Trend Micro Incorporated reserves the right to make changes to this document and to the products described herein without notice. Before installing and using the software, please review the readme files, release notes,

Add to Reading List

Source URL: docs.trendmicro.com

Language: English - Date: 2014-12-30 00:29:42
9982014 DATA BREACH INVESTIGATIONS REPORT INSIDER MISUSE  DOS ATTACKS

2014 DATA BREACH INVESTIGATIONS REPORT INSIDER MISUSE DOS ATTACKS

Add to Reading List

Source URL: dti.delaware.gov

Language: English - Date: 2014-05-13 13:02:57
999Microsoft PowerPoint - JWP_Binde_McRee_OConnor_slideswnotes.pptx

Microsoft PowerPoint - JWP_Binde_McRee_OConnor_slideswnotes.pptx

Add to Reading List

Source URL: www.sans.edu

Language: English - Date: 2015-01-28 15:59:41
1000Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Towards Generating High Coverage Vulnerability-Based Signatures with Protocol-Level Constraint-Guided Exploration Juan Caballero21 , Zhenkai Liang3 , Pongsin Poosankam21 , Dawn Song1 1

Add to Reading List

Source URL: www.andrew.cmu.edu

Language: English - Date: 2013-09-09 05:44:56