Hacking

Results: 3953



#Item
151Computer security / Software testing / Common Weakness Enumeration / Hacking / Mitre Corporation / Software quality / SofCheck Inspector

SUPPLY CHAIN ASSURANCE They Know Your Weaknesses – Do You?: Reintroducing Common Weakness Enumeration Yan Wu, Bowling Green State University Irena Bojanova, University of Maryland, Baltimore County

Add to Reading List

Source URL: static1.1.sqspcdn.com

Language: English - Date: 2015-09-09 02:31:41
152Computer network security / Software testing / Computer security / Hacking / OWASP / Penetration test / Vulnerability / Web application security / HP Application Security Center

Statement of Information Security Assessment May 2016 CosmoLex Cloud LLC 201 No. Center Drive North Brunswick NJ 08902

Add to Reading List

Source URL: www.cosmolex.com

Language: English - Date: 2016-06-02 13:51:42
153National security / Cybercrime / Hacking / Military technology / Cyberwarfare / Cyberwarfare in the United States / United States Cyber Command / Computer security / MIT Lincoln Laboratory / Cyber-attack / Cyber-Insurance

Cyber Security Research at Lincoln Laboratory Marc A. Zissman and Robert K. Cunningham Department of Defense missions increasingly are fought in and through the cyber domain.

Add to Reading List

Source URL: www.ll.mit.edu

Language: English - Date: 2016-07-12 14:35:26
154Cybercrime / National security / Intelligence / Cyberwarfare / Hacking / Cyber-attack / Computer security / Peacebuilding / Espionage / Cyberwarfare in the United States / United States Cyber Command

Conflict, security and defence The Court of Justice’s Advocate General Gerhard Reischl emerges as the crucial player in closing the rift opened up by Solange between Bonn and Brussels (the legal ramifications of the ju

Add to Reading List

Source URL: ridt.co

Language: English - Date: 2015-12-18 07:31:23
155News International phone hacking scandal / Leveson Inquiry / Media regulation / Daily Mail and General Trust / Leveson / The Mail on Sunday

Contents_______________________________________________ Executive Summary .................................................................................................................................................

Add to Reading List

Source URL: mediastandardstrust.org

Language: English - Date: 2014-06-04 00:24:21
156Java platform / Computing platforms / Cross-platform software / Java / Hacking / Java security / Java Web Start / Sandbox / Vulnerability / Computer security / Android / Malware

Evaluating the Flexibility of the Java Sandbox Zack Coker, Michael Maass, Tianyuan Ding, Claire Le Goues, and Joshua Sunshine Carnegie Mellon University {zfc,mmaass}@cs.cmu.edu, , {clegoues,sunshine}@cs.cmu.

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2015-11-22 13:12:13
157Telephony / Videotelephony / Voicemail / Automated attendant / Call forwarding / Message-waiting indicator / Voice over IP / Unified messaging / Google Voice / Phone hacking

Welcome to Antietam DIGITAL Phone We bring the world

Add to Reading List

Source URL: www.antietamcable.com

Language: English - Date: 2016-02-26 12:03:25
158Cyberwarfare / Computer network security / Hacker culture / Hacking / Cybercrime / Security hacker / Computer security / Rootkit / Hackers: Heroes of the Computer Revolution / Internet security / Firewall / Hacker

Teaching the Principles of the Hacker Curriculum to Undergraduates Sergey Bratus Anna Shubina

Add to Reading List

Source URL: www.ists.dartmouth.edu

Language: English - Date: 2010-01-25 17:05:27
159Hacking / Blog software / WordPress / Security hacker / White hat / Exploit / Hacker groups

WordPress Security Don’t Be a Target Will Chatham @willc www.willchatham.com

Add to Reading List

Source URL: www.willchatham.com

Language: English - Date: 2016-06-03 22:29:26
160Vulnerability / Risk / Actuarial science / Hacking / Software testing / Social vulnerability / Drought

African Risk Capacity (ARC) Summary of ARV Regional Workshop Feedback Forms SUMMARY Anglophone Workshop Countries: Malawi, Kenya, Ethiopia, Lesotho, Swaziland Total Number of Participants: 20 (including National Officers

Add to Reading List

Source URL: www.africanriskcapacity.org

Language: English
UPDATE