Hacking

Results: 3953



#Item
161Hacking / Cross-platform software / Scripting languages / User interface techniques / HTML / Cross-site scripting / HTTP cookie / JavaScript / Form / Same-origin policy / Dynamic web page / Web application

IEEE TRANSACTIONS ON KNOWLEDGE AND DATA ENGINEERING, VOL. 15, NO. 4,

Add to Reading List

Source URL: rich.recoil.org

Language: English - Date: 2006-04-19 16:08:00
162Cyberwarfare / Trojan horses / Spyware / Computer access control / Surveillance / Hacking Team / Exploit / Citizen Lab / Vupen / Morgan Marquis-Boire / FinFisher / Proxy server

The Citizen Lab Research Brief FebruaryMapping Hacking Team’s “Untraceable” Spyware

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2015-03-18 14:57:35
163MySQL / Cross-platform software / Hacking / Hypertext Transfer Protocol / MariaDB / PhpMyAdmin / Cross-site request forgery / Cross-site scripting / Session fixation / HTTP cookie / Session hijacking / JavaScript

phpMyAdmin Web Application Security Assessment phpMyAdmin May 18, 2016 – Version 1.2 Prepared for Michal Čihař

Add to Reading List

Source URL: wiki.mozilla.org

Language: English - Date: 2016-06-06 10:06:22
164Software testing / Computer network security / Hacking / Vulnerability / GrammaTech / Computer security

Securely Taking on New Executable Software of Uncertain Provenance (STONESOUP) Neutralizing Exploitable Vulnerabilities in Software Program Manager: Mr. W. Konrad Vesey; E-mail: How can we benefit

Add to Reading List

Source URL: samate.nist.gov

Language: English - Date: 2015-10-27 14:35:32
165Design of experiments / Hypothesis testing / Experiment / P-value / Confounding / Statistics / Linear regression / Regression analysis / Statistical hypothesis testing / Statistical power / Observational study / Statistical significance

p-Curve and p-Hacking in Observational Research

Add to Reading List

Source URL: datacolada.org

Language: English - Date: 2016-05-25 06:17:17
166Computer network security / Software testing / Hacking / Computer security / Veracode / Common Weakness Enumeration / Vulnerability / Application security / Security testing / Software quality / CVSS / Software bug

Veracode Summary Report Summary Report As of 18 Mar 2016 Prepared for: Prepared on:

Add to Reading List

Source URL: owncloud.com

Language: English - Date: 2016-04-06 15:04:57
167Computer security / Hacking / Software testing / Computer network security / Attack patterns / Recommender system / Text mining / Event correlation / Data mining / CAPEC / Intrusion detection system / Information security operations center

Mining known attack patterns from security-related events Nicandro Scarabeo1,2 , Benjamin C.M. Fung3 and Rashid H. Khokhar4 1 Department of Electrical and Information Engineering, University of Cassino and Southern Lazi

Add to Reading List

Source URL: peerj.com

Language: English - Date: 2015-10-07 04:49:41
168Computer network security / Computer security / Hacking / Software testing / Vulnerability / Application security / Web application firewall

Microsoft PowerPoint - VulnerabilityManagementInAnApplicaitonSecurityWorld_SnowFROC_20090305.ppt [Compatibility Mode]

Add to Reading List

Source URL: denimgroup.com

Language: English - Date: 2014-01-13 18:21:46
169Hacking / Software testing / Computer network security / Vulnerability / Cross-site scripting / Computer security / SQL injection

WHITEHAT SENTINEL SOURCE FOR MOBILE DA T A SHE E T WhiteHat Sentinel Source for Mobile

Add to Reading List

Source URL: www.whitehatsec.com

Language: English - Date: 2016-08-17 13:22:10
170

Philosophy of Science Association Slightly More Realistic Personal Probability Author(s): Ian Hacking Source: Philosophy of Science, Vol. 34, No. 4 (Dec., 1967), ppPublished by: The University of Chicago Press

Add to Reading List

Source URL: dl.dropboxusercontent.com

Language: English
    UPDATE