Hacking

Results: 3953



#Item
171Cybercrime / Cyberwarfare / Computer security / Hacking / Military technology / Cyberterrorism / Cyber-attack / Cyber / United States Cyber Command / Cyber-security regulation

Stefanie Schmahl, Cybersecurity, in: Freiheit und Regulierung in der Cyberwelt – Rechtsidentifikation zwischen Quelle und Gericht, Berichte DGIR Bd. 47, HeidelbergSummary by Prof. Dr. Stefanie Schmahl, Würzburg

Add to Reading List

Source URL: www.dgfir.de

Language: English - Date: 2016-04-19 08:15:24
172Common Weakness Enumeration / Hacking / Software testing / Alloy / Buffer overflow / Actor model / Vulnerability / Software development / Modeling language / CWE

Lightweight Formal Models of Software Weaknesses Robin Gandhi, Harvey Siy, Yan Wu College of Information Science and Technology University of Nebraska at Omaha, USA {rgandhi, hsiy, ywu}@unomaha.edu definitions. Consider

Add to Reading List

Source URL: faculty.ist.unomaha.edu

Language: English - Date: 2013-05-29 09:13:46
173Vulnerability / Risk / Customer experience management / Hacking / Software testing / Social vulnerability / Customer experience

DESKTOP REVIEW OF VULNERABLE CUSTOMERS November 2014 The Lending Standards Board Limited, Company Limited by Guarantee, Registered in England & Wales, NoRegistered Office: 21 Holborn Viaduct, London EC1A 2DY

Add to Reading List

Source URL: www.lendingstandardsboard.org.uk

Language: English
174Security / Cyberwarfare / Prevention / Safety / Anarchist theory / Netwar / Hacking / Military technology / National security / John Arquilla / Decentralization / Military

THE ARTS This PDF document was made available CHILD POLICY

Add to Reading List

Source URL: www.nps.edu

Language: English - Date: 2013-06-21 18:18:23
175

Equipment Interference EQUIPMENT INTERFERENCE (EI) is the term given in the Investigatory Powers Bill to describe the act of hacking. If the Bill becomes law, the police and the intelligence agencies; MI5, MI6 and GCHQ,

Add to Reading List

Source URL: www.bigbrotherwatch.org.uk

Language: English - Date: 2016-03-14 06:31:21
    176Hardware virtualization / Virtualization / Sandbox / X86 virtualization

    secuBT  – Hacking the Hackers with User­Space  Virtualization Mathias Payer <>

    Add to Reading List

    Source URL: hexhive.github.io

    Language: English - Date: 2016-06-13 11:08:40
    177Computer security / Computing / Cyberwarfare / Hacking / Computer network security / Veracode / Application security / Cross-site scripting / Vulnerability / Cross-site request forgery / JavaScript / Web application security

    WHAT IS APPLICATION SECURITY? Every enterprise’s application landscape is now both business critical and rapidly expanding. “On our current

    Add to Reading List

    Source URL: www.veracode.com

    Language: English - Date: 2016-01-20 16:34:29
    178Software-defined radio / Universal Software Radio Peripheral / Radio technology / Red Pitaya / Spectrum analyzer

    Software Defined Radio Open Source Wireless Hacking Jiska Classen Technische Universität Darmstadt Secure Mobile Networking Lab - SEEMOO

    Add to Reading List

    Source URL: www.speicherleck.de

    Language: English - Date: 2016-04-17 05:58:01
    179Hacking / Hacker groups / Internet-based activism / Anonymous / Cyberspace / Internet / Computing / LulzSec / Internet vigilantism / Ryan Ackroyd / Mustafa Al-Bassam / Topiary

    Teh Internet is Serious Business By Tim Price Background Pack CONTENTS 1.

    Add to Reading List

    Source URL: www.royalcourttheatre.com

    Language: English
    180Spyware / Surveillance / Cyberwarfare / National security / Cybercrime / Computer and Internet Protocol Address Verifier / Computer security / Malware / Internet privacy / Phishing / Federal Bureau of Investigation / Hacking Team

    MEMORANDUM To: From: Date: Re:

    Add to Reading List

    Source URL: www.aclu.org

    Language: English - Date: 2015-04-10 18:25:21
    UPDATE