Hacking

Results: 3953



#Item
531Software testing / Security / Hacking / Vulnerability / Application security / Penetration test / Cross-site scripting / Software bug / Software security assurance / Cyberwarfare / Computer security / Computer network security

ACROS Security: ACROS Application Security Analysis, Frequently Asked Questions ACROS Application Security Analysis Frequently Asked Questions 1. What is the ACROS Application Security Analysis?

Add to Reading List

Source URL: www.acrossecurity.com

Language: English - Date: 2014-07-21 13:42:08
532Computer security / Software testing / Hacking / Swarm behaviour / Zoology / Vulnerability / CVSS / Canvas / MongoDB / Cyberwarfare / Data management / Computer network security

L A RG E-S C A L E R ECO N N A ISSA N C E A N D E X PLO ITATI O N Immunity’s SWARM SPEED + INTELLIGENCE Overview

Add to Reading List

Source URL: www.immunitysec.com

Language: English - Date: 2012-07-27 12:16:27
533Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hackinthebox.org

Language: English - Date: 2014-10-26 12:59:36
534Politics / Information society / Internet activism / Electronic civil disobedience / Hacktivism / National University of Singapore / Cyberspace / Social movement / Technology / Activism / Hacking

INTER-ASIA ROUNDTABLE 2012 METHODOLOGICAL AND CONCEPTUAL ISSUES IN CYBER ACTIVISM RESEARCHAUGUST 2012 ORGANISED BY

Add to Reading List

Source URL: citizenlab.org

Language: English - Date: 2012-08-30 15:02:42
535Computer crimes / Electronic warfare / Hacking / War / United States Department of Homeland Security / Cyberterrorism / Computer security / National Cyber Security Division / Cyberwarfare in the United States / Cyberwarfare / Cybercrime / Security

Microsoft Word - Reading Module 05 _6-7_ - Virtual Advisers.doc

Add to Reading List

Source URL: www.ditc.net.au

Language: English - Date: 2014-12-07 17:10:51
536United Kingdom / Crime in the United Kingdom / Political scandals in the United Kingdom / Murder of Milly Dowler / Operation Weeting / News of the World / Phone hacking / Intergovernmental Panel on Climate Change / Leveson Inquiry / News International phone hacking scandal / Telephone tapping / Hacking

Commissioner’s report IPCC independent investigation into Surrey Police’s knowledge of the alleged illegal accessing of Amanda (Milly) Dowler’s mobile phone in 2002

Add to Reading List

Source URL: www.ipcc.gov.uk

Language: English - Date: 2013-08-16 07:17:06
537Software testing / Hacking / Vulnerability / Zero-day attack / Patch / Social vulnerability / Common Vulnerabilities and Exposures / Exploit / Responsible disclosure / Computer security / Cyberwarfare / Computer network security

0-Day Patch Exposing Vendors (In)security Performance Stefan Frei, Bernhard Tellenbach, and Bernhard Plattner Computer Engineering and Networks Laboratory (TIK) Swiss Federal Institute of Technology, ETH Zurich {stefan.f

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:28
538Hacking / Software testing / Vulnerability / Social vulnerability / United States Computer Emergency Readiness Team / Full disclosure / Responsible disclosure / Computer security / Cyberwarfare / Risk

VERSION DATE: APRIL 14, 2014        VERSION #: 001.0 KORELOGIC – PUBLIC: VULNERABILITY DISCLOSURE POLICY This document addresses KoreLogic’s policy, controls, and organizational responsibili

Add to Reading List

Source URL: www.korelogic.com

Language: English - Date: 2015-05-18 15:05:43
539Cyberwarfare / Software testing / Hacking / Crime prevention / National security / Exploit / Vulnerability / Malware / Threat / Computer security / Computer network security / Computing

OPINION Why Offensive Security Needs Engineering Textbooks Or, How to Avoid a Replay of “Crypto Wars” in Security Research

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2014-09-11 05:58:33
540Military technology / Cyberwarfare / Military science / War / Internet-related prefixes / Cyberspace / Crime / Legal aspects of computing / Cyberwarfare in the United States / Computer crimes / Electronic warfare / Hacking

A Call to Cyber Norms Discussions at the Harvard-MIT–University of Toronto Cyber Norms Workshops, 2O11 and 2O12 Belfer Center for Science and International Affairs Kennedy School of Government

Add to Reading List

Source URL: www.americanbar.org

Language: English - Date: 2015-04-15 13:36:38
UPDATE