Hacking

Results: 3953



#Item
561Internet search engines / Google Search / Google / Penetration test / Web search engine / Wget / Search engine optimization / Criticism of Google / Computing / Software / Internet

Hacking with Kali: Practical Penetration Testing Techniques

Add to Reading List

Source URL: cdn.ttgtmedia.com

Language: English - Date: 2014-09-02 12:38:56
562Hacking / Crime / Criminal law / Law / Computer crimes / Computer law / Computer Misuse Act

Microsoft Word - ip14_prj108_1998

Add to Reading List

Source URL: salawreform.justice.gov.za

Language: English - Date: 2004-09-12 18:00:00
563Cloud clients / Embedded Linux / Smartphones / Clickjacking / Hacking / Java / Embedded system / Android / Adobe Flash / Software / Computing / Cross-platform software

This paper appears at the 22nd USENIX Security SymposiumSecuring Embedded User Interfaces: Android and Beyond Franziska Roesner and Tadayoshi Kohno University of Washington

Add to Reading List

Source URL: www.franziroesner.com

Language: English - Date: 2013-11-25 19:45:09
564Technology / Telemetry / Hacking / National security / Idaho National Laboratory / SCADA / Vulnerability / Attack / Industrial control system / Computer network security / Computer security / Cyberwarfare

INL NSTB_Common_Vulnerabilities_FY2010.pdf

Add to Reading List

Source URL: fas.org

Language: English - Date: 2014-05-06 14:31:19
565Terrorism / Crime / Hacking / Military technology / Cyberterrorism / Definitions of terrorism / Counter-terrorism / Cooperative Cyber Defence Centre of Excellence / Internet-related prefixes / Computer crimes / Cyberwarfare / National security

Editor’s Note, The Fall of 2010 witnessed intense debates in the international arena on various platforms, extending from academic institutions to international organizations, on future threats to international securit

Add to Reading List

Source URL: www.tmmm.tsk.tr

Language: English - Date: 2015-02-23 10:33:37
566Power control / Automation / CAN bus / Industrial automation / Electronic control unit / On-board diagnostics / Technology / Control engineering / Embedded systems

TECHNICAL WHITE PAPER Car Hacking: For Poories a.k.a. Car Hacking Too: Electric Boogaloo Chris Valasek, Director of Vehicle Security Research for IOActive

Add to Reading List

Source URL: www.ioactive.com

Language: English
567Ethics / Social media / Privacy / Hacking / Stuxnet / Terrorism / Twitter / Social networking service / Surveillance / Technology / Cyberwarfare / Security

Information Warfare: The Role of Social Media in Conflict

Add to Reading List

Source URL: fas.org

Language: English - Date: 2015-03-13 10:32:21
568War / Hacking / Military technology / National security / Stuxnet / Just war theory / Computer security / Cyberethics / Cyberwarfare / Ethics / Electronic warfare

V viewpoints doi:

Add to Reading List

Source URL: files.allhoff.org

Language: English - Date: 2012-02-27 13:55:21
569Software quality / Hacking / Software testing / Vulnerability / C / Proprietary software / Software assurance / Requirement / Debian build toolchain / Computing / Software development / Software engineering

Reference tables from Section 2b of Practical Security Stories and Security Tasks for Agile Development Environments www.safecode.org/publications/ SAFECode_Agile_Dev_Security0712.pdf

Add to Reading List

Source URL: www.safecode.org

Language: English - Date: 2014-08-15 16:06:16
570Computing / Hacking / Software testing / Application security / Heap overflow / Malware / Network security / Vulnerability / White hat / Computer security / Cyberwarfare / Computer network security

HITBSecConf2010 OCTOBER 11TH - 14TH 2010 CROWNE PLAZA MUTIARA KUALA LUMPUR OCTOBER 4TH - 5TH

Add to Reading List

Source URL: conference.hitb.org

Language: English - Date: 2014-10-26 12:59:36
UPDATE