Hacking

Results: 3953



#Item
591Hacker / Defacement / Patriotic hacking / Hacking / Computing / Hacktivism

Computer Networks as a Battle Ground in the Middle East and Beyond Kenneth Geers, NCIS Dr. Peter Feaver, Duke University

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:35
592Vulnerability / Cyberwarfare / Failure / Computer security / Hacking / Software testing

Inter-­‐domain  rou.ng  security   Stocktaking,  state-­‐of-­‐the  art,  and   future  perspec.ves   IEPG,  IETF  78,  Maastricht,  The  Netherlands  

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2010-07-25 05:37:06
593Security / Electronic warfare / Hacking / Military technology / War / Cyber-security regulation / International Multilateral Partnership Against Cyber Threats / United States Computer Emergency Readiness Team / United States Department of Homeland Security / Computer crimes / Cyberwarfare / Computer security

Cybersecurity and Information Sharing: Legal Challenges and Solutions

Add to Reading List

Source URL: www.fas.org

Language: English - Date: 2015-03-20 13:00:34
594Vulnerability / Cyberwarfare / Failure / Computer security / Hacking / Software testing

ACSelf Disclosure BCAD[A].fm

Add to Reading List

Source URL: www.bcaa.gov.bs

Language: English - Date: 2012-07-31 07:11:14
595Hacking / Military technology / Military science / War / National security / Computer security / Internet-related prefixes / Computer crime / Cyber-security regulation / Cyberwarfare / Security / Electronic warfare

Cyber Security. Points that need to be part of the conversation

Add to Reading List

Source URL: www.lynxspring.com

Language: English - Date: 2014-08-13 09:32:30
596Nessus / Hacking / Nmap / Computer network security / Software testing / Vulnerability scanner / Vulnerability / Wireless networking / Service scan / Software / Computer security / System software

Hacking Without Re-Inventing the Wheel Nitesh Dhanjani [nitesh at dhanjani dot com] & Justin Clarke

Add to Reading List

Source URL: www.blackhat.com

Language: English - Date: 2014-12-16 19:06:34
597Software testing / Vulnerability / Microsoft Visual Studio / Computing / Software / Computer security / Hacking

Getting Started with SecureAssist June 2014 SecureAssist is an IDE plugin that points out common security vulnerabilities in real time as you’re coding. When you open a file, it quickly runs in the background and popul

Add to Reading List

Source URL: www.cigital.co.uk

Language: English - Date: 2014-07-14 16:54:22
598Computer crimes / Electronic warfare / Hacking / Military technology / Mass surveillance / International Multilateral Partnership Against Cyber Threats / Cyberwarfare / Personally identifiable information / Internet privacy / Security / Ethics / National security

The Protecting Cyber Networks Act   Undermines Privacy, Enables Cyber­Surveillance, and Threatens Internet Security    By Robyn Greene, Policy Counsel    This month, the House of Representative

Add to Reading List

Source URL: static.newamerica.org

Language: English - Date: 2015-04-20 18:04:23
599Electronic warfare / Computer crimes / Hacking / Military technology / United States Cyber Command / Cyberterrorism / Cooperative Cyber Defence Centre of Excellence / Cyber Operations / Cyberspace / Military science / Cyberwarfare / Military

THE LAW OF CYBER WARFARE: QUO VADIS? Michael N. Schmitt* INTRODUCTION ....................................................................................................... 269   I.   NORMATIVE EVOLUTION..........

Add to Reading List

Source URL: journals.law.stanford.edu

Language: English - Date: 2014-06-29 15:47:46
600Hacking / Information technology audit / CFAA / Weev / Law / Computing / Computer law / 98th United States Congress / Computer Fraud and Abuse Act

Short Comment Regarding a Proposed Exemption Under 17 U.S.CItem 1.Commenter Information: Catherine R. Gellis, on behalf of herself and the Digital Age Defense project, a project focused on governmental efforts to

Add to Reading List

Source URL: copyright.gov

Language: English - Date: 2015-02-09 16:33:54
UPDATE