Hacking

Results: 3953



#Item
491Education / ECSA / Certified Hacking Forensic Investigator / Certified Ethical Hacker / Certified Information Systems Security Professional / CompTIA / Penetration test / Computer security / Computer network security / Computing

Cyber Security Warrior Program CompTIA – EC Council – ISC2 Certificate of Completion : 240 Clock Hours Overview The objective of this program is to prepare students to build a successful career in Cyber Security. Thi

Add to Reading List

Source URL: www.tlclasvegas.com

Language: English - Date: 2014-11-01 16:24:53
492Military technology / Military science / War / Computer crimes / Cyberspace / Internet-related prefixes / Cyberwarfare in the United States / United States Cyber Command / Cyberwarfare / Hacking / Electronic warfare

PDF Document

Add to Reading List

Source URL: images.china.cn

Language: English - Date: 2014-08-05 05:52:14
493IEEE 802.11p / Vehicular communication systems / Vehicular ad-hoc network / Dedicated short-range communications / 11P / Intelligent transportation system / Telematics / IEEE 802.11 / Institute of Electrical and Electronics Engineers / Technology / Wireless networking / Wireless

Hacking the Fast Lane: Security Issues with 802.11p, DSRC, and WAVE A White Paper for Black Hat DC 2011 Rob Havelt and Bruno Oliviera January 7, W. Madison Street, Suite 1050 Chicago, IL 60602

Add to Reading List

Source URL: media.blackhat.com

Language: English - Date: 2012-04-07 14:20:18
494Cyberwarfare / Hacking / Software testing / Black Hat Briefings / Penetration test / Application security / Vulnerability / Johnny Long / Cisco Systems / Computing / Computer security / Computer network security

WARNING: Computer and network vulnerabilities will be revealed. Black Hat, Europe’s premier technical ICT security event, returns in 2005 to provide solutions to your security challenges. •Share information with hund

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:16
495Cross-platform software / Scripting languages / Remote file inclusion / Hacking / Software testing / SQL injection / HTTP cookie / PHP / Vulnerability / Computing / Software engineering / Computer security

Sept 2013 Hacker Intelligence Initiative, Monthly Trend Report #17 PHP SuperGlobals: Supersized Trouble 1. Executive Summary For a while now, the ADC research group has been looking into the implication of third-party ap

Add to Reading List

Source URL: www.imperva.com

Language: English - Date: 2013-09-03 13:41:37
496Computer security / Cyberwarfare / Hacker / Black hat / Jeff Moss / Vulnerability / Hacking / Black Hat Briefings / Computing

Black Hat Brings Leading Security Experts to Japan Seattle, Wash. — June 8, 2005 — Black Hat Inc., a security think tank focused on digital self-defense, today announced the Black Hat Briefings JapanWith suppo

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:12
497Cyberwarfare / Security / Hacking / Penetration test / Electronic commerce / Vulnerability / Quality assurance / Security testing / SAINT / Software testing / Computer security / Computer network security

PDF Document

Add to Reading List

Source URL: www.ambersail.com

Language: English - Date: 2015-03-17 07:41:04
498Hacking / Military technology / Military science / War / National security / Computer security / Cyber-security regulation / Cyberwarfare in the United States / Cyberwarfare / Security / Electronic warfare

R eport N ational C ommission for the R eview of the R esearch and D evelopment P rograms of the U nited S tates I ntelligence C ommunity

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 20:30:00
499Software testing / Risk / Hacking / Technology / Vulnerability / CVSS / Social vulnerability / SCADA / Penetration test / Computer security / Cyberwarfare / Computer network security

QSec: Supporting Security Decisions on an IT Infrastructure F.Baiardi, F. Corò, F. Tonelli, Dip. di Informatica, Univ. di Pisa L Guidi

Add to Reading List

Source URL: www.critis2013.nl

Language: English - Date: 2013-09-21 09:55:13
500Multimodal interaction / Computer programming / Cyberwarfare / Hacker / Hacking / Interaction design / Ubiquitous computing / Ambient intelligence / DIY ethic / Computing / Electronics / Design

Panel: Design for Hackability Moderator: Anne Galloway Carleton University Dept. of Sociology & Anthropology 1125 Colonel By Drive

Add to Reading List

Source URL: www.purselipsquarejaw.org

Language: English - Date: 2005-05-07 12:04:09
UPDATE