Hacking

Results: 3953



#Item
551Software testing / Hacking / Black Hat Briefings / David Litchfield / Vulnerability / Application security / SecurityFocus / Hacker / Security / Computer security / Computing / Cyberwarfare

Visit us at: www.microsoft.com/security security portal SecurityFocus is the leading provider of security intelligence services for business, and a trusted information resource for the security

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2015-05-28 15:51:14
552Cyberwarfare / Software testing / Hacking / Vulnerability / Social vulnerability / Hazard / CVSS / Critical infrastructure protection / Security / Risk / Computer security

NORTH CAROLINA DEPARTMENT OF AGRICULTURE & CONSUMER SERVICES Terrorism Threat Vulnerability Self Assessment Tool Dear Industry Partner, The Terrorism Threat Vulnerability Self Assessment tool is a guide to help you bette

Add to Reading List

Source URL: ncagr.gov

Language: English - Date: 2011-03-22 09:59:56
553Cyberwarfare / Computer network security / Cryptography / Hacking / Vulnerability / Parsing / Computer insecurity / SCADA / Penetration test / Software testing / Computer security / Technology

SECURE V2V COMMUNICATION ! A Technique for Secure
 Vehicle-to-Vehicle Communication

Add to Reading List

Source URL: galois.com

Language: English - Date: 2014-07-23 20:12:18
554Hacking / Military technology / Computer crimes / Technology / Terrorism / Cyberterrorism / Anonymity / Internet / Legal aspects of computing / Cyberwarfare / Crime / Electronic warfare

Influence Operations Influence Operations by Fred Cohen, Ph.D. Copyright (c) Fred Cohen 2011

Add to Reading List

Source URL: all.net

Language: English - Date: 2011-09-25 20:42:59
555Cyberwarfare / Hacking / Fox-IT / Surveillance / Computer law / Computer security / Forensic science / Legal aspects of computing / Stuxnet / Security / Law enforcement / Computing

nr 2 augustDigital expertise in the courtroom incident response Speed, expertise and log files make the difference p4 no delays Analyse digital evidence yourself with Tracks Inspector p18

Add to Reading List

Source URL: www.fox-it.com

Language: English - Date: 2015-04-22 11:55:08
556Hacking / Software testing / Attack surface / Vulnerability / Software quality / SAP AG / Computer security / Computing / Security

Vol 441|4 May 2006|doi:nature04750 LETTERS A regular period for Saturn’s magnetic field that may track its internal rotation G. Giampieri1, M. K. Dougherty2, E. J. Smith1 & C. T. Russell3

Add to Reading List

Source URL: www-ssc.igpp.ucla.edu

Language: English - Date: 2008-04-01 18:53:26
557Hacking / Software testing / Attack surface / Vulnerability / Software quality / SAP AG / Computer security / Computing / Security

Report: Measuring the Attack Surfaces of Enterprise Software Pratyusa K. Manadhata1 , Yuecel Karabulut2 , and Jeannette M. Wing1 1 Carnegie Mellon Univeristy, Pittsburgh, PA, USA

Add to Reading List

Source URL: www.cs.cmu.edu

Language: English - Date: 2008-11-16 17:07:39
558

C:/cygwin/home/andre/personal/mit/hacking/cannon_tech_p5_apr03_2006.ps

Add to Reading List

Source URL: www.caltechcannon.com

- Date: 2006-04-18 02:36:33
    559Cyberwarfare / Hacking / Vulnerability / Social vulnerability / Fuzz testing / Vulnerability management / Software testing / Computer security / Risk

    1 Vulnerability finding in Win32 – a comparison There are several well known techniques to find a vulnerability in a closed source product running on the Windows family of operating systems. Researchers tend to prefer

    Add to Reading List

    Source URL: www.blackhat.com

    Language: English - Date: 2015-05-28 15:51:40
    560Computing / Hacking / Spamming / Electronic commerce / Secure communication / Denial-of-service attack / Zero-day attack / Vulnerability / Attack / Computer network security / Cyberwarfare / Computer security

    Infrastructure Security 1. Infrastructure Security The PlugX RAT Used in Targeted Attacks In this report, we discuss the PlugX RAT used in targeted attacks, and look at examples of

    Add to Reading List

    Source URL: www.iij.ad.jp

    Language: English - Date: 2015-05-20 03:08:06
    UPDATE